void minimum (int i1, int i2) { if (i1 < i2) cout « i1 <« " is less than " << i2 « endl; else if (i2 < i1) cout « i2 << " is less than « i1 « endl; " « else cout « i1 « " equals " « i2 « endl; } int main () { int n, m; cout « "Enter two integers: "; cin >> n >> m; minimum (n, m); return 0; }
Q: In what ways does assembly language really work, and what is its formal definition?
A: Language of Assembly: It's a computer language that's used for low-level programming. Low-level…
Q: What are the qualities of the computer and how did it work?
A: The qualities of the computer and how it work are discussed below:
Q: Network switches, routers, and cabling all need to be protected in some way.
A: If you have two or more computer systems that are connected to each other, you have a computer…
Q: HTTP stands for Hypertext Transfer Protocol (HTTP).
A: HTTP stands for Hypertext Transfer Protocol. It is a protocol used to access the data on the world…
Q: There are several reasons why the transport layer needs packetizing from the network layer. The…
A: The network's layer: The network layer of the OSI architecture is the layer that enables the host to…
Q: affine cipher with a = 19 and ß = 8.
A: Affine cipher: The Affine cipher may be a style of monoalphabetic substitution cipher, whereby every…
Q: 10. Which figure comes next in the sequence? A B 11. Which shape completes the sequence? 00 D
A: 10) Answer: Option C Because the first has an upper dot 1 and the second has a lower dot 2 in the…
Q: Switches, routers, and cabling are all "building blocks" of data transmission networks, therefore…
A: Explanation: A computer network is a network made up of two or more computer systems that are…
Q: How many digits are there in the Hexadecimal System?
A: Definition: Hexadecimal is the name of the base-16 numeral system. As a result, the numbers 0, 1, 2,…
Q: How to Implement a GPO on project server that enables the “Hide the Programs Control Panel” group…
A: On the domain controller launch the Group Policy Management tool. Right click Group Policy Objects…
Q: Problem Statement In the game of Scrabble, each letter has points associated with it. The total…
A: dictonary = { 1 : ['A','E','I','L','N','O','R','S','T','U'], 2 : ['D', 'G'],…
Q: What are the monitoring variables of a pay-per-use monitor?
A: NOTE :- Below i explain the answer in my own words by which you understand it well. The…
Q: What is the significance of naming conventions when using C++ to invoke external assembly language…
A: Assembly Language : Assembly is a form of low-level programming language that is designed to…
Q: How might ICT be beneficial? Can you explain the significance of ICTs?
A: How might ICT be beneficial? Can you explain the significance of ICTs in below Step
Q: A list of the five subtypes of DoS attacks may be found here.
A: Definition of Denial of Service (Dos) attack When a person or a group of individuals attack any…
Q: Is there a form of operating system that I can't access because I don't have any money to do so?
A: SYSTEM D'EXECUTION: An Operating System is a piece of software that serves as a link between the…
Q: Explain how botnets are built and how they are used in DDoS attacks.
A: DDoS attacks: It is referred to as a DDoS attack, which stands for "Distributed Denial-of-Service…
Q: When it comes to computer architecture, can you explain the distinction between Harvard and von…
A: Computer architecture: Computer architectures show how a computer's physical components are…
Q: Researchers conclude that NumPy array-based programming library will continue to be the standard API…
A: Researchers conclude that NumPy array-based programming library will continue to be the standard API…
Q: Software modelling and software development are two separate things. What makes them different?…
A: Two types of software development methods: Here's a rundown of the most widely used software…
Q: In this article, we'll explain how to build a botnet and how to utilise it in a DDoS assault.
A: In computing, a botnet is a collection of infected computers under the control of a malicious actor…
Q: What is a botnet and how can it be used in a DDoS attack?
A: Ans: The term botnet is called for “robot network”, which refers to a group of robot machines…
Q: The main research contents of digital image processing include many aspects. Please list and briefly…
A: The digital image processing is also known as a image analysis system
Q: The argument for using Knowledge Management in enterprises in order to boost productivity. The…
A: Knowledge management is important because it boosts the efficiency of an organization's…
Q: why mongodb is fit in The framework of CAP theorem
A:
Q: Is there a reason why assembly language is seldom used in the creation of large applications?
A: Justification: An assembly language is a low-level programming language that allows a computer to…
Q: TCP/IP Internet protocol stack has five levels. What are they called? Is there a primary role for…
A: Given: There are five layers to the TCP/IP Internet protocol stack. So, what's their name? Does each…
Q: When does an organization's information security start and stop? What are the earliest and latest…
A: Organizations implement information security for a variety of reasons. The primary goals of InfoSec…
Q: In what ways has the use of ICT improved education? What are some of the negative effects of…
A: What are the benefits of ICT in education: Information and communication technologies ICT has a…
Q: Write a code (in Python) for a simulated (or actual) bipedal robot, that will allow it to maintain…
A: biped.py #!/usr/bin/pythonimport timeimport subprocess # set default positions mid = 140off = 0 #…
Q: Do you know of a situation in which magnetic stripe cards do not offer enough security, but smart…
A: The answer is given below.
Q: What does an Internet protocol (IP) address mean exactly? How are mnemonic addresses used? Is there…
A: What is an IP address IP address (internet protocol address) is a tabular value of a network…
Q: Whenever a company uses extranets, what are the advantages for both the company and its competitors.
A: Extranet can add value to your company by helping you connect and interact effectively with…
Q: Cite examples, a particular product for these items then thoroughly explain each: Robust Design
A: Introduction: In the field of information technology, a product is something that is generated and…
Q: he four most fundamental assumptions o
A: Below the four most fundamental assumptions of robust optimization
Q: What % of the time will proper and complete responses be given? It's been downvoted if it's not…
A: Introduction: The Hypertext Transfer Protocol (HTTP) is an application protocol for collaborative,…
Q: Code in JAVA and see attached images for information on classes and methods A company pays its…
A: The Following Program Contains 6 Class and one main Program. Class 1 : Worker Worker public class…
Q: In what ways does von Neumann architecture differ from other forms of design?
A: Von Neumann architecture: A single, shared memory for programmes and data, a single bus for memory…
Q: In what ways is ict beneficial and harmful to society?
A: ICT is also known as Information and Communication Technology, It is basically a computer based…
Q: A wide range of societally beneficial services are made possible by ICT, but how does each component…
A: The development of Information and Communication: The conventional discussion between the data…
Q: USING RELATIONAL CALCULUS Customer(custNr, name, baseLoc,birthDt, gender) Property (propId, locDesc,…
A: Here we have to create 3 tables Customer, Property, Rental. Here I am using Mysql for the purpose…
Q: Goal: Given any Tc, Pc and w, your computer program needs to be able to return a ploted PV and PH…
A: Answer is given below-
Q: Using C Language, what is the output of this code?
A: Introduction: Here we are required to explain and find the output for the above given C code.
Q: What are some of the many parts of the software system design process that need to be talked about?
A: Software design process: The Software Design Process (SDP) is a high-level, technology-agnostic…
Q: The internet has many points of control, but is there a central hub? Is this correct or incorrect?
A: Star topology is a network topology where each: The majority of data on the internet is currently…
Q: Is it necessary to keep net neutrality? Justify your response.?
A: Net Neutrality is a principle that states that the service providers of Internet should provide and…
Q: C++ is a programming language. What are the advantages and disadvantages of using an array?
A: Answer the above question are as follows:
Q: How would you characterise "Ethernet" in terms of networking?
A: answer is
Q: In what ways are the two networks fundamentally different?
A: 1. The telephone network has distinct signalling and data phases. Signaling information is combined…
Q: Do the Vector Space Model (VSM) and Latent Semantic Analysis (LSA) both have good things about them?…
A: A vector space model (VSM) is a mathematical representation of space. The phrase space model is…
complete the code above by pep9 form assembly
Step by step
Solved in 2 steps
- Using Java code an elevator simulator that uses polymorphism and object-oriented programming tosimulate the movement of elevators in a building with multiple types of passengers and elevators.The system has 8 elevators, each of which can be one of 4 types of elevators, with a certainpercentage of requests for each type. Similarly, each passenger can be one of 4 types, with adifferent percentage of requests for each type. There are 4 types of passengers in the system: Standard: This is the most common type of passenger and has a request percentage of 70%.Standard passengers have no special requirements. VIP: This type of passenger has a request percentage of 10%. VIP passengers are given priorityand are more likely to be picked up by express elevators. Freight: This type of passenger has a request percentage of 15%. Freight passengers have largeitems that need to be transported and are more likely to…Using Java code an elevator simulator that uses polymorphism and object-oriented programming tosimulate the movement of elevators in a building with multiple types of passengers and elevators.The system has 8 elevators, each of which can be one of 4 types of elevators, with a certainpercentage of requests for each type. Similarly, each passenger can be one of 4 types, with adifferent percentage of requests for each type. There are 4 types of passengers in the system:Standard: This is the most common type of passenger and has a request percentage of 70%.Standard passengers have no special requirements.VIP: This type of passenger has a request percentage of 10%. VIP passengers are given priorityand are more likely to be picked up by express elevators.Freight: This type of passenger has a request percentage of 15%. Freight passengers have largeitems that need to be transported and are more likely to be picked up by freight elevators.Glass: This type of passenger has a request percentage…Machine Problem: Implement Polymorphism to compute the wages of regular and contractual employees. Upload the screenshot of your running program and java source code. Sample Output Payroll System Parent Class ID:Name:Job Position:Job Status: ______________________________________________ Sub Class 1 ID: 101Name: John VasquezJob Position: TeacherJob Status: Regular Enter Rate/Day: 1000Enter Total Days Worked: 24 The Gross Income is: 24,000 --------------------------------------------------------------------------------------- Sub Class 2 ID: 102Name: James MontebonJob Position: Utility ManJob Status: Contractual Enter Rate/hr. 100Enter Total Days Worked: 24 --------> 8 hrs. /day The Gross Income is: 19,200 Note: If you can’t see the word “ ENTER”, which means the values are fixed, no input.
- identify the following as better representing static or dynamic binding. a) an int is an int forever and ever amen b) 2/2.0 = 1.0 c) 3/2.0 -> error message d) binding is done at compile time e) binding is slower but more flexibleUse java programming language 1.1 Create a Student Object project. Create a Student class and use the provided UML diagram to code the instance fields, constructors and methods. Note: The module mark is the average of the participation mark and the examination mark - calculate this using the calcModuleMark() method. The determineStNumber() method should compile a student number with the first 3 letters of the student's name, a '#' symbol, and a 3-digit randomly generated number (make use of a for-loop to concatenate these 3-digits). The stNumber data field should be set in the constructor by calling the determineStNumber() method. The toString() method must compile a string to display the student number, participation mark, examination mark, and module mark, formatted in table format. Student number PMark EMark MMark Mar#9186 81 64 72.00 1.2 Create a testStudents class. Do the following: -Write a static method called display() which receives…Using Java an elevator simulator that uses polymorphism and object-oriented programming tosimulate the movement of elevators in a building with multiple types of passengers and elevators.The system has 8 elevators, each of which can be one of 4 types of elevators, with a certainpercentage of requests for each type. Similarly, each passenger can be one of 4 types, with adifferent percentage of requests for each type. Passenger Types:There are 4 types of passengers in the system:Standard: This is the most common type of passenger and has a request percentage of 70%.Standard passengers have no special requirements.VIP: This type of passenger has a request percentage of 10%. VIP passengers are given priorityand are more likely to be picked up by express elevators.Freight: This type of passenger has a request percentage of 15%. Freight passengers have largeitems that need to be transported and are more likely to be picked up by freight elevators.Glass: This type of passenger has a request…
- Java Questions - (Has 2 Parts). Based on each code, which answer out of the choices "A,B,C,D,E" is correct. Each question has one correct answer. Thank you. Part 1 - 3. Given the following code, the output is __. class Base { private int x = 5; }class Derived extends Base { x = 6; }public class Sample { public static void main(String[] args) { int x = 7; Derived d1 = new Derived(); System.out.print(d1.x); }} A. 0B. 5C. 6D. 7E. Error message Part 2 - 4. A class Animal has a subclass Mammal. Which of the following is true? A. class Animal extends Mammal { }B. class Mammal extends Animal { }C. class Animal implements Mammal { }D. class Mammal implements Animal { }E. class Mammal { Animal a1 = new Animal(); }Exercises: PolymorphismProblem 1. VehiclesWrite a program that models 2 vehicles (Car and Truck) and will be able to simulate driving and refueling them inthe summer. Car and truck both have fuel quantity, fuel consumption in liters per km and can be driven givendistance and refueled with given liters. But in the summer both vehicles use air conditioner and their fuelconsumption per km is increased by 0.9 liters for the car and with 1.6 liters for the truck. Also the truck has a tinyhole in his tank and when it gets refueled it gets only 95% of given fuel. The car has no problems when refueling andadds all given fuel to its tank. If vehicle cannot travel given distance its fuel does not change.Input On the first line - information about the car in format {Car {fuel quantity} {liters per km}} On the second line – info about the truck in format {Truck {fuel quantity} {liters per km}} On third line - number of commands N that will be given on the next N lines On the next N lines –…Write a Java program code: Scenario:One of the renowned supermarket in Dhaka City, “Shwapno” is celebrating their firstanniversary of opening. They have become very popular among people in a short amount oftime. As a method of celebration they have designed three interesting and exciting offer for theircustomers for that day only!! The offers are described as follows:Offer 1: This offer says, if the name of any customer starts with “S” OR ends with “o”, theywill receive a gift which contains 1 kg miniket rice and 1 litre soyabean oil. This offer isdedicated from their name, Shwapno.Offer 2: This offer says, if one customer have taken products and his/her total product weightis less than 1.50 kg, then Shwapno will give all the products to the customer for free. If the totalweight is 1.50 kg or more, the customer will have to pay the full amount.Offer 3: This offer says, if a customer is aged less than 15, then he/she will receive chocolates.If aged 15 or more, then no gifts for the…
- Hello, I am having trouble with this homework question for my c++ course. Implement a Rational Number class with the following specifications. Data members a) numerator and denominator Functions a) Constructors: 1) default constructor 2) single parameter constructor to create numerator/1 3) dual parameter constructor to create numerator/denominator 4) Use constructor delegation across all constructors. b) Accessors and Mutators for both data members. c) Static recursive GCD function using Euclid's algorithm. d) Static LCM function for two numbers. e) Reduce function simplify a rational number. This function modifies its calling object. f) Your program should work with the supplied driver program. Notes LCM (Least Common Multiple) This function returns the smallest multiple of a and b. Step 1: Multiply a and b to find a common multiple. Step 2: Divide the common multiple by the GCD of a and b. Step 3: Return the result of Step 2. Reduce: This function reduces a fraction to…Java Questions - (Has 2 Parts). Based on each code, which answer out of the choices "A,B,C,D,E" is correct. Each question has one correct answer. Thank you. Part 1 - 5. In Java, inheritance uses __ relationship. A. is-aB. part-ofC. has-aD. member-ofE. None of the options Part 2 - 6. Given the following code, the output is __. class Apple { int x = 15; }class Banana extends Apple { int x = 25; }public class Sample { public static void main(String[] args) {Apple a1 = new Banana(); System.out.println(a1.x); }} A. Compiler errorB. 25C. 15D. 0E. None of the optionsC++ Using Card and Deck class created during the lecture or your own implementation that follows the spec for a card and deck, implement the following game: game is designed for a single player who is playing against the computeryou draw three cards for each player (player and a computer) Using the compare function from the Card class you compare each pair drawnIf the player's card is higher, the player gets a pointYou repeat this comparison 3 times (for each pair of cards you draw)The player wins if he gets more points than a computer (has more higher cards than the computer)