Write a java program that will extract all 13-digit SEU student IDs from a text. Example: File Contains: Output: 00:04:52.436,00:04:55.436 Hasibul Kabir: 1 2014201010011 2016666600048 00:23:19.281,00:23:22.281 Md. Rafsun Jani: YES sir 2011000000011
Q: Consider transmitting a packet from a source host to a destination host through a fixed route.…
A: Computer Networks referred as the data network which means the series of the computers that are…
Q: * a protocol used at the network layer that transfer data from one host to another .across a router…
A: Let us see the answer below,
Q: Whats wrong in this Java code? ---- class TriPism { public static void main(String[] args) {…
A: class TriPism { public static void main(String[] args) { myFrog = new Frog(); myBird = new…
Q: Privacy is a broad term, but what do you mean by that? Does it truly make a difference?? And what…
A: Internet access should be restricted will not be very helpful as the attackers and other crackers…
Q: In light of Facebook's privacy concerns, you have chosen to quit using the social networking…
A: Facebook has had a number of security problems. These stem mostly from the company's business…
Q: What are the most pressing considerations for system developers at every stage of the process?
A: The question has been answered in step2
Q: The term "privacy" doesn't have a clear definition. The best five things you can do to keep your…
A: privacy, is the aspect of information technology (IT) that deals with the ability an organization or…
Q: What is the definition of an operating system?
A: Operating system The operating system are the program that provides the interface between the human…
Q: When it comes to 'Hardware', what are some of the most typical types of security breaches? Text on a…
A: Hardware security threat: Hackers are increasingly targeting hardware security flaws in physical…
Q: It is important that the guidelines that govern functions that are equipped with default parameters…
A: Default parameters: Default parameters are a value that is specified in the function prototype that…
Q: The development of software and the modelling of software are two separate processes. What…
A: In software design, specific modules and components are created. Software architecture refers to the…
Q: Notice, however, that if the implementation returns a non-NULL value for a request of a zero-length…
A:
Q: there a clear definition of the term "privacy"? In order to keep your personal information safe,…
A: Data privacy, likewise called data security, is the part of data innovation (IT) that arrangements…
Q: Distinguish between the many iterations of Microsoft Windows and the notable new features that each…
A: The question has been answered in step2
Q: Instead of providing a username and password, workers at your organization must now sign in using a…
A: Readers for fingerprints: Instead of typing in a username and password, you can use a fingerprint…
Q: Investigate different software testing issues, difficulties, as well as recommended procedures.
A: Overview: This question discusses software testing principles, concerns, and methods. Testing…
Q: Indicate the isomorphism by listing the vertices separated by commas in the order they correspond to…
A: The question is to find isomorphic graph of the given graph.
Q: Understanding the heap's purpose is critical when working with dynamic data. For a programmer, what…
A: Introduction: By allocating and deallocating memory from a location known as the heap, dynamic data…
Q: Please explain why user-defined functions are preferable than pre-defined ones in the context of…
A: Answer is given below. 1.Reduction in Program Size: Since any sequence of statements which are…
Q: What are the most important email security concerns?
A: Introduction: The most serious concerns regarding the safety of electronic mail communications…
Q: In terms of information security and risk management, what are the distinctions between the…
A: A network perimeter is the safe border between a network's private and locally controlled side,…
Q: Using your own words, please explain the ramifications that resulted from the data breach that was…
A: If information is stolen or taken from a system or database without proper authentication from the…
Q: at does Regula expression accept by the following finite automaton?
A: Given:
Q: ion, should social media services like Facebook allow access to your account in order to conduct…
A: please find the solution in next step
Q: which type of physical topology is more .reliable bus topology O mesh topology O star topology ring…
A: The correct answer of the question is given below
Q: 10. To move content of register to another in 8086, write as following.
A: MOV instruction is the mnemonic key, which stands for MOVE method. It moves the 8-bit or 16 bit…
Q: LAB: Number pattern Write a recursive function called print_num_pattern() to output the following…
A: Python code with given test case and output in detail below.
Q: The incoming and outgoing traffic, the database, the rules, and the authentication of domain logins…
A: Solution: It is the most important component of the active directory network architecture and is…
Q: I. What does certification for my program entail? For many fields and jobs, being certified in the…
A: There are many hospital prefers the Certified Medical Assistants or CMA. The certification needed to…
Q: where is other two option ?
A: The other two options are given below ...
Q: If you have followed the debugging method and are still unable to repair the issue, explain in full…
A: Debugging is defined as the process of identifying, analyzing and removing the errors as this…
Q: etrics of the software development process should be described in more detail if feasible Explain…
A: oftware development metrics are quantitative measurements that help managers understand software…
Q: Using C++ Code only You are given N sticks, where the length of each rod is a positive number. The…
A: First, take the total sticks and sticks length in the input. Then find the min stick length and…
Q: What kind of goal(s) do you have in mind when it comes to putting Excel's features to use?
A: Answer: MS Excel is an ordinarily utilized Microsoft Office application. It is a bookkeeping sheet…
Q: Explain if...else... with example and draw flowchart.
A: The if else with example and flowchart is as follows:
Q: Not-OR Statement s1 && s2 && s3 s1 || s2 || s3 ! (s1 && s2 && s3) ! (s1 || s2 || s3)
A: The correct answer for the above question is 4. ! (s1 || s2 || s3)
Q: Using your own words, please explain the ramifications that resulted from the data breach that was…
A: Start: A data violation is a cyber attack in which sensitive, confidential, or otherwise protected…
Q: Answer in C Programming language: Sam has been through his scoring card in previous World Cup games.…
A: Coded using C language.
Q: Why is a waterfall system development method not ideal?
A: Waterfall is a model of life cycle development for software. SDLC is an approach to software…
Q: eless network may help in the event of a crisis.
A: Wireless network is very useful in the event of problems. As we know we are dealing with COVID-19.…
Q: In the RGB method of processing pictures, how does a computer monitor display color?
A: The RGB method of picture management begs the question: how exactly does color get shown on a…
Q: Explain if...else... with example and draw flowchart.
A:
Q: Provide an explanation as to why functions that are created by the user are preferable to those that…
A: Introduction: A function is a piece of code that serves a specific purpose and may be reused.…
Q: In order to protect your passwords, what are some of the ways that you may do so?
A: It is impossible to generate an unbreakable password. A person with sufficient intelligence and a…
Q: Today's society places a high value on privacy, yet it is also divided on the issue. Do you think…
A: The concept of privacy implies shielding something from dangers. Privacy is the right to individual…
Q: You are the project manager of a hybrid project incorporating the planning of a predictive project…
A: Agile is viewed as the more present day kind of software development strategy, as it was planned…
Q: een allocated to it at the same time.With the use of a single memory management strategy and a few…
A: Answer: The memory management capability assists with allocating the main memory space to their…
Q: Identity theft is one of the most widespread forms of internet criminal activity.. Hackers may steal…
A: Phishing: The illegal acquisition and use of another person's personal information without that…
Q: (spend, need, laugh, fall, find, break, lose, celebrate, save, leave, take, can) med Ali last week…
A: BELOW:
Q: Provide instances of common errors people make when it comes to cyber security, as well as the…
A: Inattention to data breaches: Some individuals often disregard danger signals when they arise. There…
Step by step
Solved in 2 steps
- In JAVA, write a program in a single file that: Main: Creates 10 random doubles, all between 1 and 11, Calls a method that writes 10 random doubles to a text file, one number per line. Calls a method that reads the text file and displays all the doubles and their sum accurate to two decimal places. SAMPLE OUTPUT 10.62691196041722.7377903389094555.4279257388651281.37420580654725091.18587002624988364.1803912764852284.9109699989306755.7108582343439587.7908570073730523.1806714736219543 The total is 47.13So I have a file like this: Dennis Nita +1 416-714-3829 Best Buy 1-888-BEST-BUY Aggie Mark (647) 206 3340 Isabella Constance 647 725-2212 Junk Removal 1-800-GOT-Junk How do I only take out the phone numbers I need for my new information using java?Write a program that coverts a zip code to a bar code. The bar codes use large and small bars. We will use : as a small bar and | as a large bar. Each digit has its own bar pattern. 1 is :::|| 2 is ::|:| 3 is ::||: 4 is :|::| 5 is :|:|: 6 is :||:: 7 is |:::| 8 is |::|: 9 is |:|:: 0 is ||::: The barcode also includes a check digit. The final digit added to the bar code verifies the previous numbers are correct. To Determine the checksum: Add all the digits together Determine what needs to be added to make the total a multiple of 10 The bar code also always starts and ends with a large bar. This is used by the scanner to align the letter. Drexel's Zip Code is 19104 The check digit is 5. The sum of the digits is 1+9+1+0+4 = 15. To make 15 a multiple of 10, we need to add 5. The bar code will be |:::|||:|:::::||||::::|::|:|:|:| The majority of work in this problem is done by digit. It makes sense to store the zip code as a string, not as an integer. Write the function checksum(zip)…
- Write a program that coverts a zip code to a bar code. The bar codes use large and small bars. We will use : as a small bar and | as a large bar. Each digit has its own bar pattern. 1 is :::|| 2 is ::|:| 3 is ::||: 4 is :|::| 5 is :|:|: 6 is :||:: 7 is |:::| 8 is |::|: 9 is |:|:: 0 is ||::: The barcode also includes a check digit. The final digit added to the bar code verifies the previous numbers are correct. To Determine the checksum: Add all the digits together Determine what needs to be added to make the total a multiple of 10 The bar code also always starts and ends with a large bar. This is used by the scanner to align the letter. Drexel's Zip Code is 19104 The check digit is 5. The sum of the digits is 1+9+1+0+4 = 15. To make 15 a multiple of 10, we need to add 5. The bar code will be |:::|||:|:::::||||::::|::|:|:|:| The majority of work in this problem is done by digit. It makes sense to store the zip code as a string, not as an integer. Write the function checksum(zip)…Write a client program that loops around getting two fractions from the user,output their sum, and state whether or not they are equal. Keep looping until the first fraction entered is a zero fraction. import java.util.ArrayList;import java.util.Scanner; //Define the class Fractionclass Fraction{private int n, d;public Fraction(){//Initialize the valuesthis.n = this.d = 0;}public Fraction(int n, int d){//Initialize the variablesthis.n = n;this.d = d;}//Define the getter function getNum() that returns the numeratorpublic int getNum(){//Returns numeratorreturn n;}//Define the getter function getDen() that returns the denominatorpublic int getDen(){//Returns denominatorreturn d;}//Define the boolean function isZero() that returns 0 if numerator is 0 and denominator is not equals to zeropublic boolean isZero(){return(getNum() == 0 && getDen() != 0);}public boolean isequals(Object c){Fraction f = (Fraction) c;return(Integer.compare(n,f.n))==0 &&…Write a java (Java 7 ) program for this :-- A new deadly virus has infected large population of a planet. A brilliant scientist has discovered a new strain of virus which can cure this disease. Vaccine produced from this virus has various strength depending on midichlorians count. A person is cured only if midichlorians count in vaccine batch is more than midichlorians count of person. A doctor receives a new set of report which contains midichlorians count of each infected patient, Practo stores all vaccine doctor has and their midichlorians count. You need to determine if doctor can save all patients with the vaccines he has. The number of vaccines and patients are equal. Input Format First line contains the number of vaccines - N. Second line contains N integers, which are strength of vaccines. Third line contains N integers, which are midichlorians count of patients. Output Format Print a single line containing ′Yes′ or ′No′. Input Constraint 1<N<10 Strength of vaccines…
- Write a python program that scans in a large number of tweets from a file, and prints the top 5 hashtags. Approach Parse each word in the file Find a way to isolate the hashtags from the rest of the tweet Compute the frequency of each unique hashtag. Find the top 5 hashtags. Caveats 1. Because this is public dataset, there are many tweets that use special characters that may cause issues during reading in your file. To avoid this, explicitly specify the encoding mode in open when reading in the file. with open('twitter_data.txt', 'r', encoding='utf8') as f: 2. When parsing hashtags be sure to change everything to lowercase. There are cases in the file where two hashtags are the same but differ in case. 3. There is no standard way of sorting a dictionary based on the values. Python gives you access to a sorted function where you can pass in a collection and also specify a comparator which outlines how you want to sort the values. This can be done with a one line lambda function.Write a Java program that reads from a URL and searches for a given word in the URL and creates a statistic file as an output. The statistic file needs to include some information from the URL. URL address Number of words in the URL page Number of repetitions for a given word displays the number of times the word appears. You need to have two functions, one for reading from the URL and the other function for searching the word.Find all the indexes whose labels equal 2 using np.where and the label array y. The output should be saved in two class idx.Reminder: Remember to index np.where() at zero # TODO two_class_idx = np.where(y == 2 )[0] print(f"two_class_idx output: \n {two_class_idx}") try: print(f"two_class_idx shape: {two_class_idx.shape}") except Exception: pass ([ (isinstance(two_class_idx, np.ndarray),f'two_class_idx is not an NumPy array! two_class_idx is currently a {type(two_class_idx)}'), (np.all(two_class_idx == np.array([3,9,11,12,16])),'two_class_idx does not contain the correct location values') ])
- import java.util.Random; class Main { public static void main(String[] args) { Random rand = new Random(); int a = new int[100]; for (int i = 0; i < 100; i++) { a[i] = rand.nextInt(100); } print(a); System.out.println("---"); quicksort(a, 0, a.length - 1); print(a); } public static void print(int[] a) { for (int x : a) { System.out.println(x); } } public static void swap(int[] a, int p1, int p2) { int temp = a[p1]; a[p1] = a[p2]; a[p2] = temp; } public static int partition(int[] a, int left, int right) { int pivot = right; int p1 = left; int p2 = pivot - 1; while (p2 >= p1) { if (a[p1] > a[pivot]) { swap(a, p1, p2); swap(a, p2, pivot); p2 = pivot - 1; } else { p1++; } } return pivot; } public static void quicksort(int[] a, int left, int right) { if (left < right) { int p = partition(a, left, right); quicksort(a, left, p - 1);…Write a client program that allows the user to add up any number of non-zero fractions. The program should display the running total as an exact fraction (in simplified form as numerator / denominator), and as an approximate double value. The user can finish by entering a fraction that represents a zero fraction import java.util.ArrayList;import java.util.Scanner; //Define the class Fractionclass Fraction{private int n, d;public Fraction(){//Initialize the valuesthis.n = this.d = 0;}public Fraction(int n, int d){//Initialize the variablesthis.n = n;this.d = d;}//Define the getter function getNum() that returns the numeratorpublic int getNum(){//Returns numeratorreturn n;}//Define the getter function getDen() that returns the denominatorpublic int getDen(){//Returns denominatorreturn d;}//Define the boolean function isZero() that returns 0 if numerator is 0 and denominator is not equals to zeropublic boolean isZero(){return(getNum() == 0 && getDen() != 0);}public boolean…Write a program that prints all digits of any integer in reverse order. import java.util.Scanner;public class ReverseDigits{ public static void main(String[] args) { Scanner in = new Scanner(System.in); int n = in.nextInt(); // TODO: Print the digits of n in reverse /* Your code goes here */ System.out.print(""); if (n < 0) { /* Your code goes here */ n = n*-1; //Convert number to a positive value System.out.print(" -"); //Print negative } else if (n == 0) { /* Your code goes here */ System.out.println("0"); return; } int reverseNumber = 0; while (n != 0) { int digit = n % 10; //extracting the last digit from n reverseNumber = reverseNumber*10 + digit; // printing the digit n = n / 10; //updating n by removing the last digit }…