Ving problem Read in 20 numbers, each of which islbetween 20 and 50, inclusive. As each number is read, validate it and check their value. Numbers greater than 40 are to be stored as they are. Numbers which are less than or equal to 40 should be doubled and then stored. After reading all the values, display all the valmes which wore stored
Q: As part of your introduction to engineering class's term project, make a PowerPoint presentation wit...
A: Introduction: If your introduction to engineering class includes a term project, create a PowerPoint...
Q: Write the Java statement for the following. Declare an array of integer named numbers allocating...
A: Write the Java statement for the following. Declare an array of integer named numbers allocating ...
Q: Explain how the convergence of computing, telecommunications, and media has resulted in the birth an...
A: Technological Disruption A disruptive technology is one that supplants an existing technology and fu...
Q: Identify the addressing mode of this assembly language, MOV[BX+SI + 1234H], AL Select the correct re...
A: MOV [BX+SI+1234H], AL In this addressing on base register BX, index register SI and 1234H displacem...
Q: access advanced audit policy settings, what tool is used
A: A) Group Policy it is used to access advanced policy settings
Q: Why is it important to categorized Network based on their size
A: Based on the size, networks are classified into: Personal Area Network (PAN) Local Area Network (LA...
Q: Time a process Show that you can time how long a process runs using a wall-clock/calendar timer. Sho...
A: Program Explanation: Declare header files Define a function for execution Declare and define the ma...
Q: An summary of the systems design phase should be provided.
A: System design bridges the gap between the issue domain and the current system, This phase focuses on...
Q: Write a recursive function F(N) that generalízes the following function: NF(N) 1 2 10 3 19
A: Answer:
Q: please code in python Write a function that receives a string and a number (n) as parameters and re...
A: To implement everyNth(), strings concept in python is used.
Q: Explain mechanisms that software on a desktop computer can use to securely generate secret keys for ...
A: The Diffie-Hellman algorithm will be used to establish a secure communication channel. This channel ...
Q: Instructions: 1. Your task is to ask the user for a character input. 2. Then, include the ctype.h bu...
A: In this C program question, We have to write a program for converting a lowercase to a uppercase usi...
Q: Define the concept of static random access memory.
A: Introduction: SRAM (static RAM) is a type of random-access memory (RAM) that holds data bits in its ...
Q: Write a description of the eight most important concepts in computer architecture.
A: EXPLANATION AND ANSWER: The Eight Great Ideas in Computer Architecture are as follows: Design for Mo...
Q: dress: x: $s1, y: $s2. Given: x, y are signed numbers (y > 0). oal : If 0sx< y, set $s0 to 1. Otherw...
A: slt command cam be used to check the condition 0<=x<y.
Q: Write the logic expression that represents the output of the following circuit as a function of its ...
A:
Q: You are given a 2 by n grid, where the cell on row i column j contains a non-negative number ai,j . ...
A: ANSWER:-
Q: Privacy in the context of information security is a difficult concept to comprehend.'
A: Introduction: Private information regarding personally identifiable information is generally charact...
Q: Explain CAN message format? Explain the Hardware setup / connections using the CAN interface? Able t...
A: Q1). Data Frame, Remote Frame, Error Frame, and Overload Frame are the four types of CAN messages, o...
Q: Is it possible to utilise enumerators in a loop to iterate through the elements of an array? What is...
A: Introduction: Type of enumerated data: This is a programmer-defined data type, and the components th...
Q: The specifications of a GPON network of 20 km single mode fibre (SMF) with three connectors and a 1:...
A: Below is the answer to above question. I hope this will meet your requirements....
Q: (3+5 748 ca Prefix (b) postfix
A:
Q: Mention any four widely used networking software programs that you are familiar with. When it comes ...
A: Introduction: In computer networking parlance, network software is anything that interacts, enhances...
Q: Q5. Write C++ program to find factorial of an even number?
A: INTRODUCTION: Here we need to write C++ program to find factorial of an even number.
Q: Should organizations use software service providers for all their software needs? Why or why not? Wh...
A: answer is
Q: Explain how the facts, dimensions, and characteristics are used in the star schema to make it more e...
A: Star schema is the major schema among the data store schema and it is least difficult. This schema i...
Q: editable source code: instructions are on the photo #include int main(void) { int a, b, c, d; ...
A: C Program: #include<stdio.h> /* Function getBest() of return type int with 4 parameters and re...
Q: The bitstring 1011110 and 0100001 were subjected to XAND. What is the result?
A: The XAND gate, like the XNOR gate, takes two inputs and outputs a positive value if and only if both...
Q: Explain the potential and benefits of an IoT-oriented strategy over an M2M-oriented approach by usin...
A: A more IoT-focused strategy has the following possibilities and advantages over a more M2M-focused o...
Q: Describe the many types of computing applications and the characteristics of each.
A: An application, often known as an application program or application software, is a computer softwar...
Q: Explain how to use the DiskPart programme.
A: INTRODUCTION: DiskPart: DiskPart is a command-line-based disc partitioning utility. It is the succe...
Q: 05. Write C++ program to find factorial of an even number?
A: ALGORITHM:- 1. Take input from the user for the number whose factorial needs to be calculated. 2. Pa...
Q: Convert an 894E00H from machine language to assembly language. Select the correct response: MOV[CX+ ...
A: The answer is given below.
Q: Instructive language is defined as follows:
A: Instruction: A computer program's command or order was given to a computer processor is referred to ...
Q: parent process. o ie. no grandchildren o Your process must clearly display that each forked process ...
A: Answer is in given below.
Q: Lab 13 Adding a JTextBox and a JTextArea Add a JTextField and a JTextArea to the frame. Initialize ...
A: Java programming language is used. JTextField and JTextArea are java built-in classes in javax.swing...
Q: 29,30 Thank you in advance. I already have answer on this but I would like to know if I did the righ...
A: In this question, we are having binary calculation using arithmetic operation such as addition and s...
Q: Explain are all types of modern CPU and explain the difference between them advantages and disadvant...
A: Explain are all types of modern CPU and explain the difference between them advantages and disadvant...
Q: You've been given the task of setting up a LAN for your workplace. a. As part of this arrangement, d...
A: Introduction: Novell's DOS, Windows, Mac, and OS/2 clients may connect to a TCP/IP network with this...
Q: Convert 7654321g to X2. O 111100101100111010001 111110101110011010001 O 111110101100011010001 O 1111...
A: The answers to both questions can be found in the photographs below. The answer to the first questio...
Q: How can I create a String constant that contains exactly 5 exclamation marks? Python is a programmin...
A: Introduction: String Constants: A string constant is a collection of character sequences utilized as...
Q: When it comes to computer fraud and computer crime, what is the difference?
A: Computer Crime pertains to criminal acts that are committed through the use of a computer. It is an ...
Q: Describe the process through which intra-AS routing is achieved. Give an example of a routing protoc...
A: An Autonomous System (AS) is an assortment of switches whose prefixes and steering arrangements are ...
Q: IoT and WSN involve devices that ca be connected to the Internet true or false
A:
Q: When it comes to ICT students, what is the importance of learning PROGRAMMING?
A: Introduction : ICT : Information and communication technology (ICT) is an acronym for information an...
Q: nd distributed processes are and give at least one example of each of these concepts.
A: given - Explain what distributed databases and distributed processes are and give at least one examp...
Q: Suppose that we have an array: ASM .data array DWORD 1,2,3 If want to rearrange the values to be 3,1...
A: To rearrange the values in the array.
Q: Course: Linux Operating System in Security To be correct the command must work on a Kali Linux 2021...
A: Linux operating system having the command of sudo command. The sudo command allows to run programs ...
Q: What is the Payment Card Industry Data Security Standard (PCI DSS) and why is it crucial for informa...
A: The PCI DSS is also known as Payment Card Industry Data Security Standard.
Q: Make a C program that will display the cube of a number using a while loop.
A: Use a while loop to iterate for 3 times in which we can multiply number to the result and obtain the...
In c++
Step by step
Solved in 3 steps with 1 images
- (Practice) Define an array named peopleTypes that can store a maximum of 50 integer valuesentered at the keyboard. Enter a series of 1s, 2s, 3s, and 4s into the array to represent people at a local school function; 1 represents an infant, 2 represents a child, 3 represents a teenager, and 4 represents an adult. No other integer value should be accepted as valid input, and data entry should stop when a negative value is entered. Your program should count the number of each 1, 2, 3, and 4 in the array and display a list of how many infants, children, teenagers, and adults were at the school function.(Numerical) Given a one-dimensional array of integer numbers, write and test a function that displays the array elements in reverse order.(Statistics) a. Write a C++ program that reads a list of double-precision grades from the keyboard into an array named grade. The grades are to be counted as they’re read, and entry is to be terminated when a negative value has been entered. After all grades have been input, your program should find and display the sum and average of the grades. The grades should then be listed with an asterisk (*) placed in front of each grade that’s below the average. b. Extend the program written for Exercise 1a to display each grade and its letter equivalent, using the following scale: Between90and100=AGreaterthanorequalto80andlessthan90=BGreaterthanorequalto70andlessthan80=CGreaterthanorequalto60andlessthan70=DLessthan60=F
- (Electrical eng.) a. An engineer has constructed a two-dimensional array of real numbers with three rows and five columns. This array currently contains test voltages of an amplifier. Write a C++ program that interactively inputs 15 array values, and then determines the total number of voltages in these ranges: less than 60, greater than or equal to 60 and less than 70, greater than or equal to 70 and less than 80, greater than or equal to 80 and less than 90, and greater than or equal to 90. b. Entering 15 voltages each time the program written for Exercise 7a runs is cumbersome. What method could be used for initializing the array during the testing phase? c. How might the program you wrote for Exercise 7a be modified to include the case of no voltage being present? That is, what voltage could be used to indicate an invalid voltage, and how would your program have to be modified to exclude counting such a voltage?(Practice) Write correct notation for the first, third, and seventh elements of the following arrays: a. int grades[20] b. double volts[10] c. double amps[16] d. int dist[15] e. double velocity[25] f. double time[100](Data processing) The answers to a true-false test are as follows: T T F F T. Given a twodimensional answer array, in which each row corresponds to the answers provided on one test, write a function that accepts the two-dimensional array and number of tests as parameters and returns a one-dimensional array containing the grades for each test. (Each question is worth 5 points, so the maximum possible grade is 25.) Test your function with the following data:
- (Data processing) a. Write a program to input 10 integer numbers in an array named fmax and determine the maximum value entered. Your program should contain only one loop, and the maximum should be determined as array element values are being input. (Hint: Set the maximum equal to the first array element, which should be input before the loop used to input the remaining array values.) b. Repeat Exercise 8a, keeping track of both the maximum element in the array and the index number for the maximum. After displaying the numbers, print these two messages (replacing the underlines with the correct values): The maximum value is: ___ This is element number ___ in the list of numbers c. Repeat Exercise 8b, but have your program locate the minimum of the data entered.(Numerical) a. Define an array with a maximum of 20 integer values, and fill the array with numbers input from the keyboard or assigned by the program. Then write a function named split() that reads the array and places all zeros or positive numbers in an array named positive and all negative numbers in an array named negative. Finally, have your program call a function that displays the values in both the positive and negative arrays. b. Extend the program written for Exercise 6a to sort the positive and negative arrays into ascending order before they’re displayed.Use a one-dimensional array to solve the following problem. Read in 20 numbers, each of which is between 20 and 50, inclusive. As each number is read, validate it and check its value. Numbers greater than 40 are to be stored as they are. Numbers that are less than or equal to 40 should be doubled and then stored. After reading all the values, display all the values which were stored.
- Answer in C++ code please! (Duplicate Elimination with array) Use a one-dimensional array to solve the following problem. Read in 20 numbers, each of which is between 10 and 100, inclusive. As each number is read, validate it and store it in the array only if it isn't a duplicate of a number already read. After reading all the values, display only the unique values that the user entered. Provide for the 'worst case' in which all 20 numbers are different. Use the smallest possible array to solve this problem.Use C#, and explain each step please. Use a one-dimensional array to solve the following problem: Write an app that inputs five numbers, each between 10 and 100, inclusive. As each number is read, display only if it's not a duplicate of a number already read. Provide for the "worst case," in which all five numbers are different. Use the smallest possible array to solve this problem. Display the complete set of unique values after the user inputs each new value.(5)Select the correct way to declare a two-dimensional array.A. int data[3][2] = {{3,4,3},{5,-1,12}};B. int data[3][2] = {{3,4},{3,5},{-1,12}};C. Neither.D. Both.