Write a C program in which following operation exits • Create a file named as employer_data file and save at least 10 records in it using struct of employee. Name, age, salary, and employee must use as attributes. Make a menu with following operations O Search o Update o Delete For above menu make struct array to complete the operations . For search ask the user employee ID and print complete details on the console. For delete ask the user employee ID and delete the complete details from the file. For update ask the user complete detail of employee and update the file with new record. • Make a separate file of those employees whose age is greater than 40 display all the records on console
Q: Write a program in C++ using templates to create a generic function with the name area with two…
A: Here is the c++ code of the above problem. See below step for code.
Q: 0.10 units and direction of the resultant force F₁+F₂. units magnitude direction counterclockwise…
A:
Q: Q.11 What are the challenges of intrusion detection ?
A:
Q: Identify the set number, tag, and word position for the 30-bit address stored in an 8K line set…
A: 2-way set associative cache : Two ways or levels of associativity are present in each set. The valid…
Q: log n, nn, n!+n, 10 root n, n4+n3, 22n, 3n, 500n+root n Arrange…
A: We need to arrange the given functions in increasing order of complexity.
Q: algorithm GetFact(s, i) pre-cond: s is a string of tokens and i is an index that indicates a…
A: algorithm GetFact(s, i) pre-cond: s is a string of token and i is an index that the indicates the…
Q: What type of possible error messages you can get when
A: The answer is
Q: Write a function that dynamically allocates an array of integers. The function should accept an…
A: #include <iostream> #include <cstdlib> using namespace std; int* integerArr( int…
Q: b) Explain in details the need and implementation of one way hash function (MD5).
A: One-way hash function This function is a numerical function that produces a finger impression of the…
Q: A positive integer is perfect if it equals the sum of all of its factors, excluding the number…
A: Given that, A positive integer is perfect if it equals the sum of all of its factors, excluding the…
Q: Assume we are storing an array of 32-bit values. What formula will give me the first address of the…
A: An array of 32-bit values means each value is made of 4 bytes.
Q: Based on the Python codes below, which of the following is/are true: Code A: Code B: Code C: Select…
A: We have to find which of the given codes is/are true and choose the correct answer from the given…
Q: If we store the following array of 1-byte values at memory address 0x54, what is the memory address…
A: Since array indexing starts from 0, arr[3] refers to the 4th element which is stored in the array…
Q: Create an object oriented template custom array that uses inheritance to create ordered and…
A: class Array { public: Array(); Array(int size); ~Array(); int getSize(); void…
Q: Why Double Encryption Doesn’t Work
A: solution given below:-
Q: Generate c++ code to an asynchronous error to add a fallback/secondary queue to our command group…
A: It is more difficult to generate an asynchronous error since implementations work hard to discover…
Q: What is passive and active attack in information security explain with suitable example.
A: Cyberattacks Cyberattacks are PC attacks that compromise the security of a PC system or network…
Q: Q.29 Differentiate AES and DES algorithms.
A: AES stands for Advanced data encryption and DES stands for Data encryption standard. Both AES and…
Q: Printing a well formatted invoice Use three named "constants" for the following prices: Small beads…
A: Code: Python SMALL_BEADS = 10.20MEDIUM_BEADS = 8.52LARGE_BEADS = 7.98 small = int(input('Enter the…
Q: In the query below, what does AUTOINCREMENT do? Why is it used? CREATE TABLE Worker ( WORKER_ID…
A: Answer in step 2
Q: Take some time to research a particularly useful data analysis software in criminal justice field.…
A: Python programming is the tool I would utilise for data analysis. Excel is a wonderful starting…
Q: Q.6 Explain Substitution cipher.
A: Substitution Cipher: When the plain text is encrypted (which means hiding some data) then it becomes…
Q: Write Python commands, within a print command, that output the following. (E.g.…
A: Code: Python start = int(input("Enter the start of range: "))end = int(input("Enter the end of…
Q: Let's use decorators to build a name directory! You are given some information about people. Each…
A: code is given in next step:-
Q: Q.17 List and explain various participants involved in Secure Electronic Transaction (SET).
A:
Q: Draw the UML class diagrams for the following classes: 1. An abstract Java class called Person that…
A: Draw the UML class diagrams for the following classes:1. An abstract Java class called Person that…
Q: processes undertaken regularly by organizations, 2:1+ +−11+L -:----:u -- ។
A: The answer is
Q: A stakeholder analysis is one of the vital processes undertaken regularly by organizations, Discuss…
A: Given : Stakeholders refer to all internal individuals and groups that a project will include or…
Q: Comparison of the time complexity among different sorting algorithms ? (multiple choice) a. Best…
A: From the given problem, we have to choose the correct answers from the options.
Q: Q.1 What are different encryption methods? Explain along with suitable example.
A: Encryption can be described as a technique in which information is tweaked in such a way that it…
Q: The screenshot explains what needs to be written in Java and shows the exact output needed. The…
A: Code is attached in step2 along with screenshot
Q: QB\ Write a program to generate the numbers following 16, 4, 0, 4, 16, 36, 64, 100, 144, 196, 256)…
A: First we need to Ask the user to enter the number of terms in it. increase the base by 2 and raise…
Q: I have my code main.cc #include #include #include #include #include #include using namespace std;…
A: Program Approach:- 1. Create two header file Point. h Rectangle. h 2. In Rectangle. h header…
Q: Write a simple Java program to preform the following; 1. Prime Number Program in Java 2. Palindrome…
A: - We have to program the codes in java. - Because of the guidelines restrictions, we can solve the…
Q: Q.11 What are the challenges of intrusion detection ?
A: Challenges of Intrusion Detection System (IDS) There is an exciting challenges for the IDS in many…
Q: What is passive and active attack in information security explain with suitable example.
A: Introduction In this question, we are asked What is Passive and active attack in information…
Q: Question 1 What is the result of the following calculation? Leave your answer in a binary format.…
A: Note: Due to company policies I am compelled to solve only one question and that is the first…
Q: Q.1 What are different encryption methods? Explain along with suitable example.
A: Encryption: Data are most vulnerable to attacks. Hence, encryption provides security to the…
Q: Identify and describe the four types of dependencies between the activities in the given precedence…
A: We need to identify and describe the four types of dependencies between the activities in the given…
Q: Explain Anomaly-based Instruction Detection System.
A: By monitoring system activity and categorising it as either normal or unusual, an anomaly-based…
Q: Question 333 Assume a 15 cm diameter wafer has a cost of 12, contains 84 dies, and has 0.020…
A: Answer in step 2
Q: Explain Anomaly-based Instruction Detection System.
A: Intrusion detection is very important for an organisation.
Q: assign(self, assignment:Assignment) -> AssignmentResult: """ This function is to simulate the…
A: Given : This task is based on or reflects a group of course participants. A group of students in a…
Q: Please convert this C code to Java.
A: In this code we have to convert the C code to Java code Let's convert
Q: Run the program print("Enter a Character: ", end="") c = input() if len 1: print("\nInvalid Input!")…
A: A high-level, all-purpose programming language is Python. Code readability is prioritised in its…
Q: arch on Principles of Network Security 3. Reconnaissance / Access / Denial of Service (DOS) 4.…
A: Lets see the solution.
Q: Q.17 Explain Cipher Feedback Mode (CFB) Block cipher.
A:
Q: Task 1: The first task is to make the maze. A class is created called Maze, in which a 2D array…
A: package maze; /** A class to represent cells in a maze. Cells can be blocked, * open, or visited.…
Q: Problem Statement Create a program that will determine whether a triple can generate a triangle and…
A: Given : Create a program that will determine whether a triple can generate a triangle and if it can…
Q: Explain if and how a non-binary decision tree can be converted into a binary one. Identify a type of…
A: Yes , a non binary decision tree can be converted into a binary one and binary decision tree is a…
Trending now
This is a popular solution!
Step by step
Solved in 2 steps with 1 images
- Homework #2. Chapter 7. PC #13. Name Search (page 492) Read these instructions for additional requirements carefully. Write a program that reads the contents of the two files into two separate arrays. The user should be able to enter a name the application will display messages indicating whether the names were among the most popular. 1. GirlNames.txt and BoyNames.txt contain a list of the 200 most popular names given to girls/boys born in the United States for the years 2000 through 2009. 2. Your application should use an array to hold the names. 3. The program should continue interacting with the user indefinitely unless the user chooses to quit by entering "QUIT" (should be case insensitive). 4. The user should enter a single name and the program will search the name in both lists. The user SHOULD NOT specify whether the search is for girls name or boys name. The program is responsible for finding either or both and telling the user where it found it. 5. The program should display…QUESTION 1 Write a program to read and store four student’s 21SP registered course and their grade point, sort them into an order their 21SP registered course, based on grade point from the smallest to the largest, then print them out. The student’s 21SP registered course and their grade point values should be typed in by the user in response to a prompt message. Save the file as SortCourse_yourID.javaProgramming Project #3: 2D Array Operations Complete Programming Challenge #17 found on page 491 of the text. Include the following modifications: Input the data from a file. Provide the ability to have the user enter a file name on the command line at startup. If no command line argument is provided, then prompt the user for a filename. The first line of the file contains the number of rows in the array. Each subsequent record in the file corresponds to a row in the array. If errors occur while accessing the file or the data is invalid, display an appropriate message and exit. (In Java)
- Add a prompt to ask the user to input their last name (no spaces ; please use underscores if needed), age and a balance of their choice. Create a new entry in the patient_list array with this information [Important note: you can statically modify the code to have the patient_list array hold an extra entry ; no need to do any dynamic memory allocation to accommodate the new entry]. #include <iostream> #include <cstdlib> #include <cstring> using namespace std; // Declaring a new struct to store patient data struct patient { int age; char name[20]; float balance; }; // TODO: // IMPLEMENT A FUNCTION THAT COMPARES TWO PATIENTS BY AGE // THE FUNCTION RETURNS AN INTEGER AS FOLLOWS: // -1 IF THE AGE OF THE FIRST PATIENT IS LESS // THAN THE SECOND PATIENT'S AGE // 0 IF THE AGES ARE EQUAL // 1 OTHERWISE // TODO: // IMPLEMENT A FUNCTION THAT COMPARES TWO PATIENTS BY BALANCE DUE // THE FUNCTION RETURNS AN INTEGER AS…The program is in JavaScript and must use const readline = require('readline'); 1. Create a file named dedup.js. Write a program that removes duplicates from an array. The program should be able to read an unspecified number of numbers input by the user. The user should enter a negative number when they are done entering scores. The program should remove all duplicates from the array and then iterate over the new array and display it. 2. Create a file named dedeup_2.js. Modify your dedup program and prompt the user to enter a number n. Remove all elements from the array that occur more than n times.write a function called fillArrayFromFilethat will read numbers from a file that contains one double per line into an array(up to the size of the array) and then returns the number of doubles successfully readfrom the file. You may assume that the file contains valid doubles
- The name of the C++ file must be YourIslandID_searching.cpp Write a program that defines and initializes a one-dimensional array of 30 integers. The numbers to be initialized for array are given below: 101 125 32 73 7 10 54 69 150 43 111 25 107 19 27 133 13 88 97 5 65 2 117 30 61 99 109 146 77 81 (a) Your program should prompt the user for a target value (or Key). Pass the value, the array, and the size of the array to a function that uses the linear or sequential search algorithm. The function should keep a count of the number of comparisons it makes until it finds the value. This function will return the number of comparisons to main function. (b) The program should then call a function that uses bubble sort algorithm to sort the given array. (c) The program then should call a function that uses the binary search algorithm to locate the same target value (or Key). Pass the value, the sorted array, and the size of the array to this function. It should also keep count of the number of…Write code for this Write a program that manages students’records. Each student’s record consists of a netID, a major and a GPA, maintained in parallel arrays. The program will read students’ data from a file and loop on displaying the following menu of choices: List the top n students Search for a student Exit the program. If the user chooses 1, the user will be prompted for the value of n, and the netID, major and GPA of the top n students will be listed, starting with the student with highest GPA and going down.If the user chooses 2, user will be prompted to enter the student’s netID. If the netID is found in the netID array, the array index, major and GPA of the student are displayed. If the student is not found, a “Student not found” message is displayed.If the user chooses 3, the program prints “Exiting\n” and terminates. Here are the expected screenshots when the program is executed on an external IDE ("interactive Console" on OnlineGDB) . Enter file name: in0.txt Could…The file Scores.txt contains scores of your students. Write ONLY TWO VB.NET INSTRUCTIONS to clone the Scores.txt file to Scores1.txt in the same folder USING IO.FILE METHODS AND ARRAYS: Private Sub btnClone_Click(sender As Object, e As EventArgs) Handles btnClone.Click ………………………… ………………………… End Sub
- Program is not run; error found in print(row) # Import the python CSV moduleimport csv# Create a python file object in read mode for the `baby_names.csv` file: csvfilecsvfile = open('baby_names.csv', 'r')# Loop over a DictReader on the filefor row in csv.DictReaderreader(csvfile): # Print each row print(row) # Add the rank and name to the dictionary: baby_names baby_names[row['RANK']] = row['NAME']# Print the dictionaryprint(baby_names.keys())1. In this lab, you will read two files. Firstly, the ‘AccountData.csv’ file has the name and account number.Use each account number to scan the ‘BankData.csv’ file for a matching account number to get a ‘balance’from the account transactions. You must repeatedly open, read the ‘BankData.csv’ file and close it for eachaccount number in the ‘AccountData.csv’ file unless you wish to store its entire contents in a static array.(More code and may not be enough time to complete.)2. So, for this lab, read my pseudocode in the given java files FIRST!!3. ANALYZE my code carefully.4. Then start coding the solution. I have given the solution to each lab instructor to help you during the timefor your specific lab.5. You will submit in iCollege, ONLY one file: BankDataProcessing.java6. No need to submit the data files or the BankAccount ‘object’ file.7. Do NOT MODIFY the ‘BankAccount.java’ file. PLEASE COMPLETE THE JAVA CODE BELOW AND MAKE SURE ITS LiKE THE OUTPUTimport java.io.*;import…1. In this lab, you will read two files. Firstly, the ‘AccountData.csv’ file has the name and account number.Use each account number to scan the ‘BankData.csv’ file for a matching account number to get a ‘balance’from the account transactions. You must repeatedly open, read the ‘BankData.csv’ file and close it for eachaccount number in the ‘AccountData.csv’ file unless you wish to store its entire contents in a static array.(More code and may not be enough time to complete.)2. So, for this lab, read my pseudocode in the given java files FIRST!!3. ANALYZE my code carefully.4. Then start coding the solution. I have given the solution to each lab instructor to help you during the timefor your specific lab.5. You will submit in iCollege, ONLY one file: BankDataProcessing.java6. No need to submit the data files or the BankAccount ‘object’ file.7. Do NOT MODIFY the ‘BankAccount.java’ file. import java.io.*;import java.nio.file.Files;import java.nio.file.Path;import java.nio.file.Paths;import…