What will this code print? def fun_a(): print("aa") def fun_b(): print("bb") def fun_c(): print("cc") def main(): fun_c() fun_a() fun_b() fun_c() Question 13 options: cc aa bb cc aa bb cc aa cc bb cc cc bb aa nothing
Q: 2. Signed 2's Compliment numbers arithmetic For the following signed 2's compliment values form…
A: Signed 2's Compliment numbers arithmetic For the following signed 2's compliment values A = 0xFF B =…
Q: travel agent booked the flight ticket and each traveler collect ticket from his office. Under…
A: Description/Use case diagram: 1) Use-case diagrams represent the excessive-degree functions and…
Q: What are the applications of PSO and ACO?
A: In the given question PSO is inspired by the flock of birds or fishes in food search while ACO is…
Q: Examining and modifying the contents of the 8086's internal registers 1. Use the REGISTER command to…
A:
Q: CSU asks you to design an loT system for smart lights on the Albury-Wodonga campus. Your design…
A: Solution : Smart Lighting System : IoT can be used to create a smart lighting system that allows…
Q: After executing the following piece of code: mass_kg = 1 mass_lb = mass_kg * 2.2 mass_kg = mass_kg +…
A: The complete answer in python language is below:
Q: Which of the following commands will work and which result will provide? number = 25 + 10 fruits =…
A: List A list or sequence is just an abstract data type used in computer science that contains a…
Q: Let EK: {0,1}128 → {0, 1}128 be an ideal block cipher with message space {0, 1}128, ciphertext space…
A: Hash function The purpose of a hash function is to fit a set of inputs of any size into the a table…
Q: Which of the following is true? Group of answer choices Reduce-Reduce conflicts never occur in…
A: It is false that reduce conflicts never occurs in shift reduce parsers. As in shift reduce parsers…
Q: Q.12 Explain TLS.
A:
Q: What type of recursion is present in the method below? public static void mystery (int x, int y) {…
A: When making decisions, if-else statements are used to describe which block of code should be run…
Q: W.X 14 1 1 y2 32 32 1 I 1 (c) 1 1 1 1 1 a. wxyz'+wxy'z'+wx'yz +wx'yz' +wx'y'z'+w'x'yz'…
A: INTRODUCTION: In a Karnaugh map, or truth table, a minterm is a Boolean expression that returns 0s…
Q: --Problem -3 -Create a flowchart design that depicts the solving of the following problem: Asks user…
A: Please refer to the following step for the complete solution of the problem above.
Q: How can you describe LL(1) grammars? a.They process input right to left producing rightmost…
A: These question answer is as follows,
Q: Using SQL, how do we retrieve all the Employees for which the Birth Date is between 1/1/1955 and…
A: We need to write the query about the above problem.
Q: make Algorithm for Complete labelled branching Input: a base [1,2,...k] for G; the basic…
A: given data: Algorithm for Complete labelled branchingInput: a base [1,2,...k] for G; the basic…
Q: n python. Please do not copy from other websites, as it is incorrect and I'd like to be able to…
A: Introduction: In this question, we are given binary search code and in that code, instead of…
Q: Write a C program using switch statement. The program will read a character (op) and will calculate…
A: Explanation 1) Below is C Program using switch statement to read a character(op) and calculalate and…
Q: Describe in brief the maximum-bipartite-matching (MPM) problem. Present an LP algorithm to solve the…
A: A set of edges in a bipartite graph that are chosen so that no two edges share an endpoint is known…
Q: In the chapter materials and the conference we saw and discussed the various Quotent programs that…
A: ANSWER:-
Q: cumstances is it appropriat both satisfy the union's re-
A: A domain-specific programming language called Structured Query Language (SQL)[5] is utilized to…
Q: Classify genetic algorithms
A: A genetic algorithm is used to train a spam classification model. Neural networks could be that…
Q: The errors that can be pointed out by the compiler are known as _____________ a.Internal errors…
A: Solution: Given, The errors that can be pointed out by the compiler are known as _____________…
Q: Define the criteria that test-driven development must possess in order to succeed. For instance, how…
A: A software development approach known as Test Driven Development (TDD) emphasizes the creation of…
Q: Q.5 Explain ISAKMP protocol for IP sec.
A: ISAKMP It is the name of the key management protocol used in IPSec. The Internet Security…
Q: What is all IP technology?
A: Similar to how computers utilize the internet to transmit information, an All-IP Voice Network uses…
Q: Explain types of Intrusion detection systems (IDS).
A: An Intrusion Detection System (IDS) which are the system that monitors the network traffic which are…
Q: Please make a data flow diagram for an online room reservation system.
A: Data flow diagram is a diagram which maps the flow of information for any systems or processes. This…
Q: Write the code below for the class declarations for the three different types of Computer classes.…
A: Code
Q: Because of how our hash map was constructed, all of the data is held in a single container known as…
A: A hash table is a group of objects that are organised such that it is simple to locate them…
Q: P3. Pangrams are words or sentences containing every letter of the alphabet at least once, A through…
A: Answer:
Q: Similar to the previous one but with some slight changes, what will the following piece of code…
A: Conditional statements in python: In programming languages, we frequently need to manage the flow of…
Q: In python. Please explain so it can be applied to future problems. Thanks. Write a bubble sort that…
A: As per the given question, we need to implement the functions bubble_values and insertion_values.…
Q: 1. Determine the entropy associated with the following method of generating a password. Choose, and…
A: “Since you have asked multiple questions, we will solve the first question for you. If you want any…
Q: Question 2: Feature Engineering Having considered missing data, we can now further prepare our…
A: Here I have defined the method named extract_title(). Inside the function, I have used a loop to…
Q: 10 OD DE D 9 B 13 14 15 Q Apply the repeated nearest neighbor algorithm to the graph above. Starting…
A: Answer the above question are as follows
Q: Suppose we want to insert the following elements in the order they appear below: 19 17 13 8 631 If…
A: Data Structure : A specific format known as a data structure is used to organize, process, retrieve,…
Q: Q.5 Explain ISAKMP protocol for IP sec.
A: A framework for dynamically creating security associations and cryptographic keys in an Internet…
Q: Draw a sequence diagram to represent the scenario of "using vending machine to purchase drinks".…
A: I'm providing the Sequence diagram to represent the above-mentioned scenarios & also I provided…
Q: Examining and modifying the contents of the 8086's internal registers 1. Use the REGISTER command to…
A: The correct answer for the above mentioned question is given in the following steps for your…
Q: Given the following recursive method and function call, what is printed out? Enter your answer as a…
A: recursive function is used, which is the function which calls itself.
Q: You have recently learnt about 3-tier architecture programming and how to develop software using…
A: Layered architectures which are said to be the most common and also widely used architectural…
Q: Suppose we want to insert the following elements in the order they appear below: 19 17 13 8 631 If…
A: Data Structure : A specific format known as a data structure is used to organize, process, retrieve,…
Q: MOV RPT: MOV MOV BX, 520H AL. [SI] [BX]. AL
A: The answer is
Q: Write aAlgorithm for Blocks Image Input: a base and strong generating set of a group G acting on fl;…
A: given data:- Input: a base and strong generating set of a group G acting on fl;an invariant…
Q: What is the Statement of the Queens Problem?
A: The above question is solved in step 2 :-
Q: Part One: Short answer questions: 1. Determine the entropy associated with the following method of…
A: Answer: We have explain in very well how to find the entropy for the secure password
Q: What are the applications of PSO and ACO?
A:
Q: Select the answer that best describes the following statements: I. A class may have only one…
A: Answer the above question are as follows
Q: Question 3 Now that we have formatted our data, we can fit a model using sklearn's Ridge()…
A: Python function to fit a model using sklearn's Ridge() class and return the trained model is, from…
What will this code print?
Question 13 options:
|
cc aa bb cc |
|
aa bb cc |
|
aa cc bb cc |
|
cc bb aa |
|
nothing |
Step by step
Solved in 5 steps with 2 images
- Microsoft Visual C# 7th edition. need help, please. Thanks In previous chapters, you created applications for Marshall’s Murals. Now, modify the version of the MarshallsRevenue program created in Chapter 5 so that after mural data entry is complete, the user is prompted for the appropriate number of customer names for both the interior and exterior murals and a code for each that indicates the mural style: L for landscape S for seascape A for abstract C for children’s O for other When a code is invalid, re-prompt the user for a valid code continuously. For example, if Y is input, output Y is not a valid code, and re-prompt the user until a valid code is entered. After data entry is complete, display a count of each type of mural. For example the output should be in the following format with the correct number next to each mural type: The interior murals scheduled are: Landscape 1 Seascape 2 Abstract 1 Children's 3 Other 9 The exterior murals scheduled are: Landscape 4 Seascape 0…What will this code print? def fun_a(): print("aa") def fun_b(): print("bb") def fun_c(): print("cc") def main(): fun_c() fun_a() fun_b() fun_c() main()Using C# create a console app doing the following Write a method that takes two integers and displays their sum. Write a method that takes five doubles and returns their average. Write a method that returns the sum of two randomly generated integers. Write a method that takes three integers and returns true if their sum is divisible by 3, false otherwise. Write a method that takes two strings and displays the string that has fewer characters. Write a method that takes an array of doubles and returns the largest value in the array. Write a method that generates and returns an array of fifty integer values. Write a method that takes two bool variables and returns true if they have the same value, false otherwise. Write a method that takes an int and a double and returns their product. Write a method that takes a two-dimensional array of integers and returns the average of the entries.
- This code is correct but can you add to the code this instructions: If the father's age is equal to the mother's age and the age is odd, then the child is Female The code should call `createKidPerson` in main. #include <iostream>using namespace std; typedef struct { int age; char gender;} Person; void displayPerson(Person); Person createKidPerson(Person father, Person mother); int main(void) { Person father; Person mother; father.gender = 'M'; mother.gender = 'F'; //ask the user for the age of the Male Person and the age of the Female Person. cout<<"Enter the Male Person's age: "; cin>>father.age; cout<<"Enter the Female Person's age: "; cin>>mother.age; //create a new Person and call createKidPerson() function Person kid = createKidPerson(father, mother); displayPerson(kid); return 0;} Person createKidPerson(Person father, Person mother) { Person p; if(father.age>=mother.age) //if…The FKGLF is: 0.39(totalWords/totalSentences) + 11.8(totalSyllables/totalWords) - 15.59Using the FKGLF and your knowledge of how to input and output text files with Java, write an application that will: Take in a text file (anyText.txt), Correct the spelling then save to another file (anyTextCorrected.txt), Calculate the grade level. Outputs. Your solution needs to return: the number of words in the text, the number of spelling errors corrected with the misspelled words listed, the number of sentences in the text, the number of syllables in the text, and the Flesch-Kincaid Grade Level. One assumption you can make is the accuracy of SpellChecker(). You have access to the Java method SpellChecker that takes in a string, assumed to be a word, and returns a correctly spelled word. (Note: If the word returned is different than the word input, then there was a spelling error.) One Constraint: This program requires two classes: GradeLevel and GradeLevelTest. GradeLevel will be the…Please rewrite the code: Here is the code: class PidManager {// Declare the range of possible pid valuesprivate static final int MIN_PID = 300;private static final int MAX_PID = 5000; // Declare a memory locationprivate static int[] pids; // Create a method named allocatMap().// This method is used to allocate the// memory to store the pids.public static int allocatMap() {pids = new int[MAX_PID - MIN_PID];if (pids == null) {System.out.println("Memory allocation failed.");return -1;} for (int i = 0; i < pids.length; i++) {pids[i] = 0;}System.out.println("Memory allocated successfully.");return 1;} // Create a method named allocatPID().// This method is used to allocates and returns a pid.public static int allocatPID() {if (pids == null) {System.out.println("PID Manager is not initialized ");return -1;} int pidNum = -1; for (int i = 0; i < pids.length; i++) {if (pids[i] == 0) {pids[i] = 1;pidNum = i + MIN_PID;break;}}if (pidNum == -1) {System.out.println("Unable to allocat…
- Fix the errors in the Customer class and the Program. DATA FILE ThinkAbout Tech 344 Park Ave, NY, NY 10022 Kemp Technologies 3601 Broadway, NY, NY 10021 Verizon 6 Hudson Street, NY, NY 10001 Merrill Lynch 7 World Financial Center, NY, NY 10001 Philips Laboratories 345 Scarborough Rd, Briarcliff Manor, NY 10510 CODE #include <iostream> #include <fstream>#include <string>using namespace std; class Customer { // Constructorvoid Customer(string name, string address) : cust_name(name), cust_address(address){acct_number = this.getNextAcctNumber();} // Accessor to get the account numberconst int getAcctNumber() { return acct_number; } // Accessor to get the customer namestring getCustName(} const { return cust_name; } // Accessor to get the customer addressstring getCustAddress() const { return cust_address; } // Set a customer name and addressstatic void set(string name, string address); // Set a customer addressvoid setAddress(string cust_address) { cust_address =…This program uses Java. You will be making a general class that will be called “GeneralBusiness”. This class must have the following methods: selectSalesTax() – This method will read in a file “stateTaxInfo.txt” that has the name of a state and the tax percentage (decimal form) for that state and save them to the given arrays. It will then print a menu for the user to choose the state that the business is in and set the variables to hold the values. getCustomerName() – This method will prompt the user for the name of the person using the program calcSalesTax() – This method will be sent a subtotal and calculate the sales tax outputReceipt() – This method will output a generic receipt as follows: Subtotal $37.50 Sales Tax $2.44 Total $39.94 outputMenu() - This method will receive the number of items and output a generic menu as follows: Item 1 Item 2 Item 3 Item 4 must have the following variables: stateNames - array saleTax – array saleTaxAmount theStateName subtotal total firstName…Simple Student Management System Build the following app using Python Tkinter library. Using this app, user can • add student information • view all students • search student(s) by name • remove student by id Add • First name, last name, date of birth cannot be blank while adding a specific student information. • However major can be blank, which gets set to "Undefined" if left out blank. • Student Id is automatically generated by the program (ex: 1001, 1002, 1003, 1004 ….) If the user keeps a mandatory field blank (ex: First name) and presses "Add Student" button, it displays the following message box: first name is required If the user successfully enters all the necessary information and presses the "Add Student" button, it displays the following confirmation message box: student added View All When the user presses the "View All" button, it displays all the student’s information (Id, First name, Last name, Date of birth, and Major) in a nice formatted way. Example below: • Must…
- IN C# PLEASE Create class Cube. The class has attributes length and width and depth, each of which defaults to 1. It has read-only properties that calculate the Perimeter and the Area for a side of the cube, and another that calculates the cubed feet for the cube. (You will have to research how to do that calculation online) It has properties for length and width and depth. The set accessors should verify that length and width and depth are all floating-point numbers greater than 0.0 and less than 20.0. Write an app to test class Cube by creating 3 cubes of different sizes.Computer Science The program below uses a class, DomainAvailabilityTools, which includes a table of registered domain names. The main function prompts for domain names until the user presses Enter at the prompt. The domain name is checked against a list of the registered domains in the DomainAvailabilityTools class. If the domain name is not available, the program displays similar domain names. #include <iostream>#include <string>#include <cctype>#include "DomainAvailabilityTools.h"using namespace std; // *********************************************************************** // prompts user string. Returns string.string GetString(string prompt) {string userInput; cout << prompt << endl;cin >> userInput; return userInput;}// *********************************************************************** int main() {const string PROMPT_DOMAIN_NAME ="\nEnter a domain name to check availability (Enter to exit): ";DomainAvailabilityTools dvTools; string…Java OOP Write a complete address book maintenance application. The user of the program has four options: Add a new person, delete a person, modify the data of a person, and search for a person by giving the name. Use the AddressBook class, either the original one from the chapter or the modified one from the previous exercises. You have to decide how to allow the user to enter the values for a new person, display person information, and so forth.