Q2: Give the output of the following program Matlab 1. S=input('Enter the subject:','s'); 2. fprintf('subject is %s\n',S) 3. M1 = input('Enter the mark l: ',); 4. M2 = input('Enter the mark2: '); 5. fprintf('marks are %i%i average is",M1,M2) 6. M=[M1 M2]; 7. A= sum(M)/2; 8. disp(A)
Q: Write a synopsis of how template files are used in project management and how they help project team…
A: In project management, templates are repeatable project blueprints that help to decrease rework…
Q: Describe the field of technological equipment and provide a list of probable employment in this…
A: Describe the field of technological equipment and provide a list of probable employment in this…
Q: Write an overview of the utilization of agile approaches based on annual surveys and surveys funded…
A: Write an overview of the utilization of agile approaches based on annual surveysand surveys funded…
Q: Iterated and non-iterated GET requests, authoritative and root server DNS records, and DNS queries…
A: Recursive DNS queries occur when a DNS client requests information: On the Internet, Domain Name…
Q: Give two instances of internal and exterior fragmentation to illustrate the point. Make use of…
A: Fragmentation: Fragmentation is a data storage process in which memory space is used inefficiently,…
Q: 7. Consider the following Java code: O import java.util.Scanner; public class Q8 { public static…
A: Java is an object oriented programming language.
Q: Performing a server database migration might provide a number of risks.
A: Introduction: If the transition process is mismanaged as it frequently is, migration may cause more…
Q: Describe the notion of inheritance and the links between items.
A: Inheritance: It encourages the reuse of software. It's a method for generating new classes from…
Q: Is it possible to sum up what software engineering is all about in just one sentence? What does that…
A: - We need to talk about software engineering.
Q: Consider the URL for the base HTML file and 30 JPEG images residing on the same server,…
A: The page consists of a base HTML file and 30 JPEG images and all 31 of these objects reside on the…
Q: What are the phases in data mining data processing?
A: Given: The practice of extracting interesting patterns and information from massive volumes of data…
Q: What are your thoughts about the FSF?
A: The FSF: The Free Software Foundation (FSF) is a non-profit organization dedicated to the…
Q: private key vs. public key distinction in cryptography
A: The both Public and private keys form the basis for public key cryptography. These both keys are…
Q: Describe the field of technological equipment and provide a list of probable employment in this…
A: The field of technology equipment consists of distributer and manufacturers of computer systems,…
Q: Look at an airline's database system, which makes use of snapshot isolation. When a non-serializable…
A: Start: Consider a database system that uses snapshot isolation for an airline. Describe a scenario…
Q: sing spaghetti code and the GOTO debate as examples. Give a concise explanation of the Structured…
A: We must first describe what the Structured Programming Theorem stated regarding spaghetti code and…
Q: Write an overview of the utilization of agile approaches based on annual surveys and surveys funded…
A: Given: When used to software development projects, agile methodology is a concept that encourages…
Q: Construct a Deterministic Finite Automata (DFA) for each of the following Languages over Alphabet…
A: L3 = { w | all strings start with 'a' or ended with 'b' } Here, we have to take care of the two…
Q: What are the risks of transferring a server's database to another server?
A: (1) Dependencies: The most typical error involves a lack of understanding about the applications…
Q: Describe the field of technological equipment and provide a list of probable employment in this…
A: Equipment for technology: Distributors and manufacturers of computer systems, mobile phones, and a…
Q: Finding two peer-reviewed research articles on project management ethics and summarizing them is…
A: Bullying at Work: An Ethical and Leadership Dilemma for All Project Managers" is the title of the…
Q: What is the definition of data-structure? What are the different kinds of data structures?
A: An information storage system used to store and organize data is a "data structure." An information…
Q: What is a function in Matlab, and why are functions crucial for coding in Matlab?
A: The Answer is in step-2.
Q: How does the mindset of a software tester differ from that of a software developer? Why is it…
A: How does the mindset of a software tester differ from that of a softwaredeveloper? -> In the mind…
Q: are some of the advantages of SAS versus
A: Below are some of the advantages of SAS versus SCSI?
Q: When an FIRQ interrupt is acknowledged and being serviced
A: F, I, and E flags are set to 0 sets F=1 and I=1 disabling FIRQ and IRQ requests.
Q: Describe the tools and technology that are utilized to assist with IT project management.
A: Definition: IT project management tools and technologies Tools and approaches for project management…
Q: Where may ICTs have a positive impact on business and education? What are some instances of this?
A: Establishment: The term Information and Communication Technology (ICT) didn't arise in front of me…
Q: Q2: Give the output of the following program 1. for a=0: 5 disp('value of a: %s\n', x); 3. if(a=15)…
A: In the given program a ranges from 0 to 5. We have to display the value of a from 0 to 5. Therefore…
Q: A computer network is defined as a system that connects computers together. What are the system's…
A: When two or more nodes (for example, computers) are linked together, they can share resources (such…
Q: Construct a Deterministic Finite Automata (DFA) for each of the following Languages over Alphabet…
A: DFA takes a string as input and process it. If it reaches final state, it is accepted, else…
Q: What are the benefits of an intranet or extranet for a company?
A: Please find the answer below :
Q: In C#, what is the difference between Const, Read Only, Static, and Non-Static variables?
A: In C#, what is the difference between Const, Read Only, Static, and Non-Staticvariables?
Q: n terms of functionality, technology, and management, WANs and LANs are comparable. Explain what a…
A: The Answer is in given below steps
Q: What kind of files should you upload to the cloud? Why would you upload files to the cloud rather…
A: Cloud storage: The word "cloud" refers to a procedure that allows computer resources to be…
Q: Constructing widely scattered data environments calls for decisions on how best to balance various…
A: provides businesses with the capabilities to generate: In economics, a trade-off is referred to as a…
Q: Temperature of a city in Fahrenheit degree is input through the keyboard. Write a VB.net windows…
A: Program to convert from Fahrenheit to Celsius: Private Sub Button2_Click(sender As Object, e As…
Q: In the case of a data security breach, what are the company's rules for disclosing information?
A: Steps to Create an Emergency Evacuation Plan: A precise plan of action or a thorough grouping of…
Q: Given the following Matrices; 1 -2 0 -2 0 -4 1 B = 1 0 -1 6 8 2 1 -1 A = -2 3 1 0 1 0 -2 0 3 6 -10 3…
A: Forming the matrix: A = [1,-2,0;-2,3,1;0,1,0] B = [-2,0,-4,1;1,0,-1,6;8,2,1,-1] C =…
Q: The intermediary layer between the database and the client servers is referred to as a three-tier…
A: The answer is given in the below step
Q: Assume you work in a corporation where the internal network is protected from the outside Internet…
A: Firewall: Internet-connected private networks, particularly intranets, utilize network firewalls to…
Q: Even if the main (master) database has a "exclusive lock" on changes, this may still happen. Even if…
A: Data Inconsistency: Data inconsistency occurs when a database has various tables that deal with the…
Q: List two essential tools for systems administrators?
A: A system administrator- (sysadmin) is an information technology professional who manages a multiuser…
Q: What kinds of files do you think you'll want to save to the cloud? Why would you want to copy files…
A: The Answer is in step-2.
Q: What is the difference between a TextBox and a MaskedTextBox? How can you make TextBox utilize all…
A: TextBox vs MaskedTextBox S.No. TextBox MaskedTextBox 1. It is mainly used to retrieve…
Q: Show the pictorial representation of the linked list (at each step) once the following sequence of…
A: We need to write a program for linked link as per the given scenario. ***The language used is Python
Q: What is the difference between storing hashed passwords in a file and having an encrypted password…
A: Password Database: The user's password is concatenated with a static salt and a randomly generated…
Q: why is MetaData so important?
A: Data Flow Diagram: It is used to show the flow of data between various elements of a system in…
Q: The data dictionary is used in which of the six DBLC stages?
A: Answer:
Q: Assume you work in a corporation where the internal network is protected from the outside Internet…
A: Firewalls prevent your computer or network from outside cyber attackers by filtering out malicious…
Step by step
Solved in 2 steps with 1 images
- What is the probability that in a classroom of x people, at least 2 will be born on the same day of the year (ignore leap year)? Use a Monte Carlo Simulation and a frequency table to write a program that calculates this probability, where the number of people (x) in the simulated class is given by the user. The probability for a class of size 23, should be right around 50%. I have an outline for the code but please only use python language and NO "break", "true" language import mathimport random # create and initialize frequency table:ft = []k = 0while(k < 365) : ft.append(0) k = k+1 # Allow the user to determine class size:print("Please type in how many people are in the class: ")x= int(input()) success = 0 # Simulate:c = 0while(c < 10000) : # Step 1: re-initialize the birthday frequency table (it must be re-initialized for each play-through (why?): k = 0 while(k < 365) : ft[k] = 0 k = k+1 # Step 2: randomly get x birthdays and update frequency table: k =…What is the probability that in a classroom of x people, at least 2 will be born on the same day of the year (ignore leap year)? Use a Monte Carlo Simulation and a frequency table to write a program that calculates this probability, where the number of people (x) in the simulated class is given by the user. The probability for a class of size 23, should be right around 50%. NO language of "break" or "true" please! Please use the outline given below for the code:Use JAVA to create a card game with in which the dealer shuffles the deck and deals 13 cards out of the 52 to the player. If the player sorts her hand and it includes a king of heart, then in response, the dealer should write on the console, "You won!" if not then then "You loose again." Make sure the cards are randomized to get different outputs. Also, create a unit test for the win and loose cases.
- suppose that two fair dice are tossed repeatedly and the sum of the two uppermost faces is determined on each toss. what is the probability that we obtain a sum of 3 before we obtain a sum of 7? Please just write matlab code that solves this problem using simulation. please have it so i can change the amount of tosses in the outputPART 1. EXAMINE THE FF. CODE int numValue =2; int answer =0; switch(numValue){ case 1: answer +=1; case 2: answer +=2; case 3: answer +=3; break; case 4: answer +=4; case 5: answer +=5; default: answer =0; break; } cout <<”Answer: ” << answer << endl; 1. What is the answer(output) if the value of numValue is 22? ____________________ 2. What is the answer(output) if the value of numValue is 1? ____________________ 3. What is the answer(output) if the value of numValue is 4? ____________________ 4. What is the answer(output) if the value of numValue is 2? ____________________ 5. Is break statement in the default case needed? Why or why not? Explain.____________________ Part 2. Create a C++ program that will input student’s ID, scholarship code (“A/a-D/d”), units, tuition fee Per unit is 450php and total tuition after adding misc. fee of 1500php and lab fee of 900php and discount. Scholarship Code…PART 1. EXAMINE THE FF. CODE int numValue =2; int answer =0; switch(numValue){ case 1: answer +=1; case 2: answer +=2; case 3: answer +=3; break; case 4: answer +=4; case 5: answer +=5; default: answer =0; break; } cout <<”Answer: ” << answer << endl; 1. What is the answer(output) if the value of numValue is 22? ____________________ 2. What is the answer(output) if the value of numValue is 1? ____________________ 3. What is the answer(output) if the value of numValue is 4? ____________________ 4. What is the answer(output) if the value of numValue is 2? ____________________ 5. Is break statement in the default case needed? Why or why not? Explain.____________________
- Write a program that determines an integer value the user had in mind. Your program first asks the user to enter the lower and upper bounds of the range that the integer belongs to, and then presents a series of questions “Is the number greater than x?” with yes/no answers to the user in order to determine the integer value that the user had in mind. For instance, if the integer in mind is 5 and the interaction between the user and your program is: Please enter the lower bound: -10 Please enter the upper bound: 50 Is the number greater than 20 (Y/N)? n Is the number greater than 4 (Y/N)? y Is the number greater than 12 (Y/N)? n Is the number greater than 8 (Y/N)? n Is the number greater than 6 (Y/N)? n Is the number greater than 5 (Y/N)? n Your program should then print: The number you had in mind is 5 Your program should ask roughly log2(upper_bound − lower_bound) questions. Your program A3_1.py should include a main() function and may include other functions that you prefer.…This assignment does not exactly match the one in the textbook on which it is based. I don't want any counter-controlled loops in your solution. Your solution should be able to detect when the accuracy isn't improving and then display the results of the work (as outlined below): Look at Programming Exercise **5.25 in the textbook on approximating the value of π. It is described as: π = 4 ( 1 - 1/3 + 1/5 - 1/7 + 1/9 - 1/11 + ... + (-1)^(i+1)/(2i-1) ) Notice that Java has the best possible value of π that can be stored as a type double available as Math.PI (part of the java.lang package). See how close you can get to the best value of π using a loop with the above technique. Notice that the above implies you are testing the value of your own estimate as it approaches the best value available in Java (as a type double). This would not be a pre-determined, counter-controlled loop. You are testing the results (sentinel-controlled) until you reach a value with the minimum discrepancy…A word is called as a good word if all the letters of the word are distinct. That is, all the letters of the word are different from each other letter. Else, the word is called as a bad word. This can be continued based on the user input is 'Y'.
- A two-dimensional random walk simulates the behavior of a particle moving in a grid of points. At each step, the random walker moves north, south, east, or west with probability equal to 1/4, independent of previous moves. Write a program RandomWalker.java that takes an int command-line argument n and simulates the motion of a random walk for n steps. Print the location at each step (including the starting point), treating the starting point as the origin (0, 0). Also, print the square of the final squared Euclidean distance from the origin as double.Write a program that plays a guessing game with the user. The user should pick a letter, and the computer should try to guess the letter. After each guess, the user should tell the computer whether its guess was too high or too low. With this information, the computer should be able to guess the letter within five tries. The user should be able to give whole words or single upper or lower case letters as responses. c++Write a program in Python where we ask the reader to enter five positive numbers and then print thelargest one. (Hint: first write a input variable for the largest number, then write a range function.The range function should have another input variable for number input. Then do mathematicalcomparisons.)