Using, HTML,CSS , and javascript Write a program that takes as input the speed of a car e.g 80. If the speed is less than 70, it should print “Ok”. Otherwise, for every 5 km/s above the speed limit (70), it should give the driver one demerit point and print the total number of demerit points. For example, if the speed is 80, it should print: “Points: 2”. If the driver gets more than 12 points, the function should print: “License suspended”.
Q: Inquire about the following subject areas: Neural networks and deep learning are the two main types…
A: The most general name for machines that replicate human intelligence is artificial intelligence…
Q: onents of an OS?
A: Introduction: Random Access Memory (RAM) is an essential component of an operating system (OS) that…
Q: To what extent do the benefits of a certain procedure for protecting information justify its use?…
A: Introduction:- The use of procedures for protecting information is essential in today's digital…
Q: How may the most crucial aspects of an OS be summarized in the most efficient way?
A: The most crucial aspects of an operating system (OS) can be efficiently summarized by focusing on…
Q: Do you realize how many different stages there are involved in the process of establishing a website…
A: Creating a website from scratch involves several stages, each of which plays a vital role in the…
Q: I'm having a hard time determining which aspects of the operating system are the most crucial ones…
A: 1) An operating system (OS) is a software program that manages computer hardware and software…
Q: Is there any way that the advancement of technology has altered the way that we speak to one…
A: Technology has an effect on communication since it makes it easier, quicker, and more efficient.…
Q: How would you approach developing a real-time operating system if you had to write the code for it?…
A: System Running in Real Time Real-time systems are distinct from standard operating procedures and…
Q: Create the following matrix in MATLAB: A=
A: here's the complete MATLAB code to create the matrix A, find B (the square of each element of A), C…
Q: void Func(int a[], int & r) { int i; for (i = 0; i < 100; i++) { a[i] = r + i/2; } } The…
A: Assembly code for the Func() function is given below: The function prologue saves the base pointer…
Q: design assets disposal topic from CAPS document where you can use micro teaching steps in…
A: Answer Microteaching is a teaching technique that involves practicing and teaching a specific skill…
Q: As compared with making use of a pre-built data model, what are the most significant changes…
A: 1. Better caliber You should think about the data before designing an application, much as…
Q: Is Microsoft's Windows OS meant to be proactive or reactive? The performance of each is being asked…
A: Microsoft's Windows OS is designed to be both proactive and reactive.
Q: R studio : profit margin for each month - equals to profit a after tax divided by revenue…
A: Below is the complete solution with explanation in detail for the given question about profit margin…
Q: 20. Write a program to create a library in python and import it in a program.
A: Introduction: Python is an interpreted, high-level, general-purpose programming language that is…
Q: While building the microkernel of an operating system, what fundamental design principles should be…
A: In contrast to the traditional kernel-based approach, the microkernel operating system is predicated…
Q: Are there advantages to using the internet for those who have physical or mental disabilities? What…
A: The answer for the above question is given in the following step for your reference.
Q: 7. How many topological orderings does the following graph have? What are they? b f
A: Topological ordering or topological sort is a linear ordering of the vertices in a directed graph…
Q: Can you elaborate on the main advantages of separating software and hardware?
A: A basic idea in the field of computer engineering and technology is the separation of software and…
Q: I have the following SQL Script: CREATE OR REPLACE TRIGGER SCSP_VIEW_UPDATE INSTEAD OF UPDATE ON…
A: We have to create How to add logic so that blanks and empty strings cannot be used to update…
Q: In what way do communications and the field of data communications relate to one another? Does one…
A: All the above subparts question is solved in step 2 :-
Q: While creating the core of an OS, what guidelines should be followed for the microkernel? Is there a…
A: Microkernel OS is based on the idea of reducing the kernel to only basic process communication and…
Q: How may information assurance be thwarted, and what kinds of services or safeguards are available to…
A: Information assurance can be thwarted in several ways, including: Cyber attacks: Cybercriminals…
Q: The first network that would become the Internet was known as ARPANET.
A: Here, we must discuss the distinctions between the Internet and the World Wide Web (WWW) The…
Q: Find out some applications of index numbers
A: Introduction: Index numbers are a useful tool in economics and finance for measuring changes in…
Q: Is the Windows operating system a reactive or proactive effort on Microsoft's part? Considering…
A: Is Windows, which comes from Microsoft, a proactive or a reactive operating system?Which one would…
Q: re Investment Value = investment amount * (1 + monthly interest)^(number of years * 12) Using this…
A: I have provided PYTHON CODE along with CODE SCREENSHOT and OUTPUT SCREENSHOT---------------
Q: 1. The representation must be on a linear scale (not logarithmic) Linear scale means each year is…
A: Here is an example of a linear scale timeline that meets the requirements you listed:
Q: What kind of a management technique does Linux use for its virtual memory?
A: Virtual memory The term "virtual memory" refers to a method of memory management that enables a…
Q: Could we make a complete inventory of the RAM-based components of an OS?
A: A comprehensive inventory of RAM-based operating system components would be difficult to offer…
Q: Compared with 4Gnetworks,5Gnetworks_______, support fewer devices have higher latency transmit…
A: Introduction : It is very easy to find out the option for the current question we have . We are…
Q: how can i open the pay.dat file again what command
A: I guess in the previous answer some things are missing so i am again giving you the answer with…
Q: Throughout the process of developing a mobile application, what kind of technological,…
A: Introduction A mobile application's development can be a difficult process with many steps and…
Q: Create a module for username validation. This module must meet the following acceptance criteria: •…
A: Dear Student, The required code along with code implementation and expected output is given below -
Q: Explain what you understand "motion input" to imply using your own words. Please enlighten us on the…
A: Motion input refers to the use of body movements or gestures to interact with devices or systems…
Q: 6. Determine the breadth-first and depth-first traversals for the following graph: (start with…
A: Breadth-first search (BFS) and depth-first traversal are two different algorithms used to traverse…
Q: Investigate the differences between the Microsoft Edge and Google Chrome web browsers. What are the…
A: Microsoft Edge and Google Chrome are two of the most popular web browsers today. There are some…
Q: How may information assurance be thwarted, and what kinds of services or safeguards are available to…
A: Cyber attacks: Cybercriminals can use various techniques to gain unauthorized access to sensitive…
Q: What additional web browsers than Google Chrome, Internet Explorer, Mozilla Firefox, and Safari have…
A: Web browsers are computer program class that lets you look up and view websites on the Internet.…
Q: Is there a service or protection mechanism that may be employed to keep data safe? Seek out the…
A: In the current digital era, data security is a major concern. It is more crucial than ever to…
Q: Internals of operating systems are not within our expertise.
A: According to the information given:- We have to define Internals of operating systems are not within…
Q: How does the cyber kill chain model benefit cybersecurity professionals, especially as it pertains…
A: The Cyber Kill Chain model is a well-liked framework employed in the cybersecurity sector to…
Q: What does it mean for a number when a bit is enabled and turned on in respect to the number? What…
A: 1) A bit is the smallest unit of data and can represent a value of either 0 or 1. When a bit is…
Q: How would you approach developing a real-time operating system if you had to write the code for it?…
A: Operating System in Real Time Real-time operating systems are designed to perform tasks within…
Q: Where can I get a directory of all the standardization organizations that work on data…
A: The standards for data transmission and computer networking specify the requirements for the…
Q: Can you elaborate on the main advantages of separating software and hardware?
A: Below is the complete solution with explanation in detail for the given question about the main…
Q: aspects of an OS are widely regarded as essential
A: The OS Aspects and essential are as follows:
Q: What are the codes for this case? Emergency Department Patient Case Number: ED16-White, Salem…
A: In this question we have to define codes related to a patient case in the emergency department.…
Q: Describe the ways in which modern technology has facilitated better communication among employees…
A: "Internal communication" refers to the efforts that an organisation puts forth with the intention of…
Q: Java Programming: There must be no errors at all & show output. Attached is rubric. Make…
A: Java is a high-level, class-based, object-oriented programming language that is widely used for…
Using, HTML,CSS , and javascript Write a program that takes as input the speed of a car e.g 80. If the speed is less than 70, it should print “Ok”. Otherwise, for every 5 km/s above the speed limit (70), it should give the driver one demerit point and print the total number of demerit points.
For example, if the speed is 80, it should print: “Points: 2”. If the driver gets more than 12 points, the function should print: “License suspended”.
Step by step
Solved in 4 steps with 2 images
- . Many companies use telephone numbers like 555-GET-FOOD so the number is easier for their customers to remember. On a standard telephone, the alphabetic letters are mapped to numbers in the following fashion: A, B and C = 2 D, E and F = 3 G, H and I = 4 J, K and L = 5 M, N and O = 6 P, Q, R and S = 7 T, U and V = 8 W, X, Y and Z = 9 Write a program that asks the user to enter a 10-character number in the format XXX-XXX-XXXX. The application should display the telephone number with any alphabetic characters that appeared in the original translated to their numeric equivalent. For example, if the user enters 555-GET-FOOD, the application should display 555-438-3663. After displaying the translated telephone number, ask the user if they’d like to enter another number. If the user enters “y”, run the program again. If not, terminate the program. (10 points)Note: the sentence the program reads SHOULD NOT be hardcoded. Allow the user to enter the sentence the program reads PYTHONjava Write a program that prompts the user to enter a point (x, y) and checks whether the point is within the rectangle centered at (0, 0) with width 10 and height 5. For example, (2, 2) is inside the rectangle and (6, 4) is outside the rectangle, as shown in the Figure. (Hint: A point is in the rectangle if its horizontal distance to (0, 0) is less than or equal to 10 / 2 and its vertical distance to (0, 0) is less than or equal to 5 / 2.) Here are sample runs of the program: Sample 1: Enter a point with two coordinates: 2 2 Point (2.0, 2.0) is in the rectangle Sample 2: Enter a point with two coordinates: 6 4 Point (6.0, 4.0) is not in the rectangle Analysis: (Describe the problem including input and output in your own words.) Design: (Describe the major steps for solving the problem.) Coding: (Go over your code step by step) Testing: (Describe how you test this program). In other words run your code with sample outputs.Many companies use telephone numbers like 555-GET-FOOD so the number is easier for their customers to remember. On a standard telephone, the alphabetic letters are mapped to numbers in the following fashion: A, B, and C 2 D, E, and F 3 G, H, and I 4 J, K, and L 5 M, N, and O 6 P, Q, R, and S 7 T, U, and V 8 W, X, Y, and Z 9 Write a program that asks the user to enter a 10-character telephone number in the format XXX-XXX-XXXX. The application should display the telephone number with any alphabetic characters that appeared in the original translated to their numeric equivalent. For example, if the user enters 555-GET-FOOD the application should display 555-438-3663. Gaddis Tony. Starting Out with Python (2-downloads) (p. 367). Pearson Education. Kindle Edition.
- Using Java.. Write a program that reads the user's first name and last name, and then use them to create a UPM email for the user. If the total number of characters in the user's full name, (first name + last name), is less than 10 letters, you should use the full name to create the user’s email. The general format of the user’s email should look like this: firstName.lastName@upm.edu.sa For example: First name = Ali Last name = Omar Total number of letters in both first and last names = 7 letters (<10 letters) Output = omar.ali@upm.edu.sa If the number of characters in the user's full name, (first name + last name), is greater than or equal to 10 letters, you should only use the first character in the user’s first name, and the whole last name to create an email. For example: First name = Abdullah Last name = Omar Total number of letters in both first and last names = 12 letters (>=10 letters) Output = a.omar@upm.edu.sa Note: you can assume the user will always enter lowercase…One interesting application of computers is drawing graphs and bar charts (sometimes called histograms). Write a script that reads five numbers between 1 and 30. For each number read, output HTML5 text that displays a line containing the same number of adjacent asterisks. For ex- ample, if your program reads the number 7, it should output HTML5 text that displays *******.Many companies use telephone numbers like 555-GET-FOOD so the number is easier for their customers to remember. On a standard telephone, the alphabetic letters are mapped to numbers in the following fashion:A, B, and C = 2D, E, and F = 3G, H, and I = 4J, K, and L = 5M, N, and O = 6P, Q, R, and S = 7T, U, and V = 8W, X, Y, and Z = 9Create an application that lets the user enter a 10-character telephone number in the format XXX-XXX-XXXX. The application should display the telephone number with any alphabetic characters that appeared in the original translated to their numeric equivalent. For example, if the user enters 555-GET-FOOD, the application should display 555-438-3663.
- I need this in python Write a program that prints a formatted "No parking" sign as shown below. Note the first line has two leading spaces. For ALL labs, end with newline (unless otherwise stated). NO PARKING 2:00 - 6:00 a.m.Python programming In a department store sale, customers who purchase over 2000 are given 10% discount. Write a program that will accept for the purchase amount of a customer, solve for his/her discount if there’s any, ask for the money he/she is going to pay, then output the discounted price and the change of the customer.”Write a program that reads the user's first name and last name, and then use them to create a UPM email for the user. If the total number of characters in the user's full name, (first name + last name), is less than 10 letters, you should use the full name to create the user’s email. The general format of the user’s email should look like this: firstName.lastName@upm.edu.sa For example: First name = Ali Last name = Omar Total number of letters in both first and last names = 7 letters (<10 letters) Output = omar.ali@upm.edu.sa If the number of characters in the user's full name, (first name + last name), is greater than or equal to 10 letters, you should only use the first character in the user’s first name, and the whole last name to create an email. For example: First name = Abdullah Last name = Omar Total number of letters in both first and last names = 12 letters (>=10 letters) Output = a.omar@upm.edu.sa Note: you can assume the user will always enter lowercase letters
- ***Microsoft Visual Studios (C++)*** Write a program that given two coordinate pairs and a third single coordinate will linearly interpolate or extrapolate the third second coordinate. For example, let's say at 50 degrees Celsius the length of a metal rod is 5.4 cm and at 60 degrees Celsius the length is 5.5cm. I can interpolate the length at 53 degrees Celsius by doing 5.4cm + 3*(.1/10)=5.43cm. Your program does not need to continuously run, but should prompt the user for two coordinate pairs, the third first coordinate and return the extrapolated or interpolated third second coordinate.U is upward, D is downward, L is left and R is right : Using the methods pickDir() and exractInt() as shown below, to write a simple automated game: how long does it take a robot to travel from a left line of a field to the right line? Assume field is 15 units apart (meters, kilometers, it doesn’t matter), and the robot starts on the left line. pickDir(): // return string with random direction and random distance (within maxDist) public static String pickDir (int maxDist) { Random r = new Random(); // random number generator // return direction + distance return ( "" + "LRUD".charAt( r.nextInt(4) ) + (r.nextInt(maxDist) + 1) ); } extractInt(): // returns integer from string, from pos p1 to p2: str = "D1" – extractInt(str,1,1); public static int extractInt (String str, int p1, int p2) { return ( Integer.parseInt( str.substring(p1, p2+1) ) ); } Write the main() method that keeps looping until the robot’s random left…Write a program that prompts the user for a U.S. dollar amount and then converts it to Japanese Yen, British Pound, and New Zealand currency. Once you calculate the conversion, print a single line with each converted currency only showing two decimal places, and its respective code (as shown in the example below): 10 U.S. Dollars in Egyptian Pound (exchange rate = 15.9976) would print as follows after conversion: 10.00 USD in Egyptian Pound is 159.98 EGP