Write a main function that performs the following: • Using a for loop, prompt the user to enter the size of 9 items.2 • Print all sizes that are smaller than the value of your AUM ID, each on a newline. If your ID is 32567, the main function should print all prices that are less than 32567my is Jd:-58768 • Print on the screen your name, your student ID and your section number with commas in between. For example, if your name is "xxx", your ID is 32567 and your section is M7, the main function should print "Name: xxx, Section: M7, ID: 32567". My Name:- BADER M ÁLMUTAIRI My-Section:- M7
Q: 4. Recall the logic gates pvq png Inverter OR gate AND gate Given the following logic circuit
A: Propositional Logic: It is ways by which the statements can interact with the each other and it is…
Q: Design a 5x32 decoder using: a) 4x16 decoders with active-high Enables and minimum gates.
A: Designing 5x32 decoder using :- 4x16 decoders with active-high enable and minimum gates
Q: What does it mean when you say that Scrum separates the "what" from the "how?"
A: I have provided this answer with full description in step-2.
Q: I'm quite into games now, so how about we play In or Out! When a given number is even, the team…
A: i have provided this answer with full description in step-2.
Q: 1) Explain, which is the operation of following code? which is the output of the code? INCLUDE…
A: The Answer is in step-2.
Q: 1. List some of application that you can controlled by a potentiometer. 2. Explain the function of…
A: Since you have asked multiple questions, we will solve the first question for you. If you want any…
Q: Which procedure must be carried out in the absence of precise data?
A: Without enough data, the data analysis procedure will be impossible to finish.Justification: The…
Q: EXERCISE 1 Based on the image attached, the program was written for a marketing research firm that…
A: // CokeOrpepsi.cpp - This program determines if a customer prefers to// drinl Coke or Pepsi or some…
Q: Suppose that you have formatted your disk with a block size of 1024 bytes and assume that we have…
A: The Answer start from step-2.
Q: What five graphical data properties does data visualization use to convey a story?
A:
Q: We'll say that a String is ab-balanced if for all the 'a' chars in the string, there exists a 'b'…
A: - We have to create an ab balanced string program. - We are using Java here.
Q: Does it explain how a computer works? Then you may talk about computer components.
A: A computer is a machine that runs software programs. The software programs are converted into…
Q: A renowned coffee business chain would like to expand in retail food chain operations in next year.…
A: The ER Diagram of Coffee retail business will contains the following Components: it has the…
Q: . Your Content (50% mark) 2. Your Formatting (50%). Your work has to be in proper APA format, must…
A: Each question is answered in different steps 1.a Active directory Rights Management Services.…
Q: Is it true that when a method gets an object as a parameter, it has access to the original object or…
A: Reference data type parameters, such as objects, are also passed into methods by value. This means…
Q: Write a program to ask the user to enter (i) a filename and (ii) regular expression. The program…
A:
Q: What exactly is the purpose of the QWORD type?
A: The solution to the given problem is below.
Q: Which fibre is utilised to protect the inner core and prevent the cable from straining in fiber-…
A: A Fibre optic wire is a similar wire to electrical cable, which is also called as Optical fibre…
Q: What technologies are used to create a virtual private network (VPN), and what exactly is a VPN?
A: A VPN is a connection which is established between user and internet for safe internet browsing. In…
Q: True or False Topic: Visual Basic a. Each array element has a unique subscript (or index) assigned…
A: Each array element has a unique subscript (or index) assigned to it. indexing assignment begins at…
Q: Explain any FIVE (5) benefits of IoT to businesses, society, and government. (Example: enhanced…
A: IOT Definition ---------------IoT stands for the Internet of Things. However, that doesn't explain…
Q: catypes that may be utilised in
A: Whenever a variable is defined in C, it has to be associated with a certain data type. This gives an…
Q: using C++ We've already tried comparing 3 numbers to see the largest among all, so let's try a more…
A: #include <iostream>using namespace std; int main() { int arr[5]; int max = arr[0];…
Q: As part of an information system, how are programmes written?
A: System of information: It's a collection of subsystems that work together to achieve a goal. It…
Q: What are the four different approaches that firms might use to implementing a system conversion…
A: The introduction of the new system and the quick termination of the old system is known as direct…
Q: Ramadan Kareem Hareedy and Wahdan Didn't Paricipate in Yesterday's Problem So Their Cousin Ne3mat…
A: ALGORITHM:- 1. Take the numbers of inputs count from the user. 2. Then take that number of input…
Q: Briefly describe the layered nature of a database management system (DBMS) application.
A: DBMS ( Database Management System): Any database management system (DBMS) is a software package that…
Q: stion succinctly. What are the benefits of elliptic curve
A: Introduction: Elliptical curve cryptography is a method of encoding data files in such a way that…
Q: Do you consider Ada Lovelace to be a cryptographer or a computer programmer when you think of her?
A: The following is the distinction between programming and cryptography: Computer programming is…
Q: Using Document Object Model (DOM): Modify “src” attribute in the following HTML code, photo1.jpg to…
A: To change the src or the source attribute of the image tag . First we have to locate the image tag…
Q: Create the class Suitcase. Suitcase has things and a maximum weight limit, which defines the…
A: As per the requirement program is completed. Note: In the question programming language is not…
Q: Concurrency control is a term used to describe the ability to manage many processes at the same…
A: Concurrency control: This is a database management system (DBMS) technique for addressing multi-user…
Q: Make a list of six different types of access. Each one should be classified as either a residential…
A: We have six access technologies
Q: Discuss how Windows processes and threads are linked using suitable examples?"'
A: Answer :
Q: We'll say that a String is ab-balanced if for all the 'a' chars in the string, there exists a 'b'…
A: Answer the above java program are as follows
Q: what are Genetic and evolutionary algorithms ?
A: Below is the answer to above question. I hope this will be helpful for you..
Q: Logical data modeling demonstrates how data is arranged and how it connects to other data without…
A: Data models: Data models are those models that serve as the foundation for an organization's project…
Q: When converting a randomly generated array of size m to a heap, what is the temporal complexity?
A: Find the answer with explanation given as below :
Q: Consider improving student satisfaction with the course enrolling process at your own university or…
A: I graduated from the 'WBTU state university. The institution provides online registration for…
Q: Whether or whether startups need a cyber security strategy is up for debate. " What are your…
A: Answer :
Q: What methods can be used to impsove information poivacy
A: The answer is as follows:
Q: What happens when a user closes a form that was presented using the ShowDialog method?
A: Definition: When a user hits the close form button of a dialogue box or changes the value of the…
Q: There should be four vulnerability intelligence sources specified and described. Which one appears…
A: The solution to the given question is: Vendors CERT organization Public network sources Membership…
Q: Tom and Sangu played a game. First, the Tom gives Sangu a sequence of different numbers N a1, a2,.,…
A: Question Process Explanation: The first line of the input contains a single integer T denoting the…
Q: What are the three main features of information security management in the United States?
A: Information security, often known as InfoSec, reduces security risks such as unauthorized access,…
Q: Which routing protocol does an edge router use to collect data to build its routing tables for paths…
A: Mechanized and automated adjustments and adaption of the routes according to the current state of…
Q: We'll say that a String is ab-balanced if for all the 'a' chars in the string, there exists a 'b'…
A:
Q: Which fibre is utilised to protect the inner core and prevent the cable from straining in fiber-…
A: The explanation is as follows.
Q: Explain the process of installing and configuring Active Directory Certificate services and how to…
A: To install Active Directory on the server: From the task bar, open the Server Manager. From the…
Q: Why do we use SAS call routine?
A: According to the question the sas is the function components in the programming language and which…
Step by step
Solved in 3 steps with 3 images
- (Numerical) Write a program that tests the effectiveness of the rand() library function. Start by initializing 10 counters to 0, and then generate a large number of pseudorandom integers between 0 and 9. Each time a 0 occurs, increment the variable you have designated as the zero counter; when a 1 occurs, increment the counter variable that’s keeping count of the 1s that occur; and so on. Finally, display the number of 0s, 1s, 2s, and so on that occurred and the percentage of the time they occurred.This is for r Regarding a for loop, which of the following is not true? The for keyword must be followed by parentheses. Following the for statement, the code to be executed is recognized by it being indented. The number of times the loop will be performed is determined by the length of the vector passed to the for keyword. The for loop can contain other for loops.Write a function that gets a number between 1 and 20 from the user.Return the number. (Use a while loop to make sure you get a number inthat range) Write a function that sums the first n odd numbers (1 + 3 + 5 + ...). Use nas a parameter and return the sum. Write a mainline (code outside of a function) that: calls the first function to get a number n (between 1 and 20) calls the second function to get the sum of the first n odd numbers prints the sum143
- In Java Write a program that prints the 128-character ASCII table. It should print the tablein eight tab-separated columns. The first column contains a "Dec" heading (fordecimal number) with the numbers 0 through 31 below it. The second columncontains the ASCII characters associated with the numbers 0 through 31. The nextcolumns contain the subsequent numbers and associated ASCII characters. See thebelow sample output for details. Be aware that that output was produced by aprogram running in a console window in a Windows environment. If you runyour program in a different environment, the first 32 characters and the lastcharacter will probably be different from what’s shown below.Note that some characters display in a non-standard manner. For example, thenumber 7 corresponds to a bell sound. You can’t see a sound, but you can see thevacant spot for 7’s character in the below table. The number 8 corresponds to thebackspace character. You can’t see a backspace, but you can see how the…In Java Write a program that prints the 128-character ASCII table. It should print the tablein eight tab-separated columns. The first column contains a "Dec" heading (fordecimal number) with the numbers 0 through 31 below it. The second columncontains the ASCII characters associated with the numbers 0 through 31. The nextcolumns contain the subsequent numbers and associated ASCII characters. See thebelow sample output for details. Be aware that that output was produced by aprogram running in a console window in a Windows environment. If you runyour program in a different environment, the first 32 characters and the lastcharacter will probably be different from what’s shown below.Note that some characters display in a non-standard manner. For example, thenumber 7 corresponds to a bell sound. You can’t see a sound, but you can see thevacant spot for 7’s character in the below table. The number 8 corresponds to thebackspace character. You can’t see a backspace, but you can see how the…*in Python The built-in function eval takes a string and evaluates it using the Python interpreter. For example: >>> eval('1 + 2 * 3') 7 >>> import math >>> eval('math.sqrt(5)') 2.2360679774997898 >>> eval('type(math.pi)') <class 'float'> Write a function called eval_loop that iteratively prompts the user, takes the resulting input and evaluates it using eval, and prints the result. It should continue until the user enters 'done', and then return the value of the last expression it evaluated.
- In Python: Write a for loop to print each contact in contact_emails.Sample output with inputs: 'Alf' 'alf1@hmail.com' mike.filt@bmail.com is Mike Filt s.reyn@email.com is Sue Reyn narty042@nmail.com is Nate Arty alf1@hmail.com is Alf My code so far: contact_emails = {'Sue Reyn' : 's.reyn@email.com','Mike Filt': 'mike.filt@bmail.com','Nate Arty': 'narty042@nmail.com'} new_contact = input()new_email = input()contact_emails[new_contact] = new_email for new_contact in contact_emails:print('{} is {}'.format(new_email, contact_emails[new_contact])) However it is giving me the wrong output: alf1@hmail.com is s.reyn@email.com alf1@hmail.com is mike.filt@bmail.com alf1@hmail.com is narty042@nmail.com alf1@hmail.com is alf1@hmail.com I dont understand how to separate the contact_names from the contact_emails in the same list.Program51.java Write a program that uses a while loop to generate 49 random integers, all from 20 to 49, inclusive. The same loop should print the integers in seven rows and right-aligned in columns seven characters wide. The program should report both the count and the total of integers in the 20s, 30s, and 40s. See Sample Output.Sample Output (IMAGE BELOW) Program52.java Write a program that prompts the user for a binary number (from 3 to 8 bits) as a String and converts it to base-10 decimal value. There are several ways to do this in Java but your program must use a for loop and first principles to perform the conversion. Print the base-10 number when the loop ends.Program53.java Write a program that uses a for loop to print a table of the square roots, squares, cubes, and cube roots of the integers from 5 to 15, inclusive...five columns in all. Values in both roots columns should display in columns 9 characters wide with 5 decimals. All other columns should display in columns 7…Program53.java Write a program that uses a for loop to print a table of the square roots, squares, cubes, and cube roots of the integers from 5 to 15, inclusive...five columns in all. Values in both roots columns should display in columns 9 characters wide with 5 decimals. All other columns should display in columns 7 characters wide without decimals.
- Create a program using C++ that satisfies the following requirements: SAMPLE ATTACHED Develop a function called "randomPairsGenerator" that generates and displays pairs of random numbers, with a maximum of 5 pairs per line. Within this function, use a loop to create 20 pairs of random numbers:1) The first number in each pair should be within the range of 1 to 50, inclusive.2) The second number in each pair should be within the range of 51 to 100, inclusive. For each pair, print the two numbers side by side, separated by a space. Separate each pair with a comma. After every 5 pairs, start a new line. After all 20 pairs have been generated, display the total count of pairs in which the sum of the two numbers is divisible by 7.Use C++ codingWrite a program that calculates a student's GPA. Ask the user to enter grade and also the credit hours of the course in a loop until user enter “N” or “n”. Earned points in that course becomessum of all points in all subjects/ Total credit hours i.e.,GPA= sum of earned points in all subjects/total credit hoursGrade points of each grade are as followsGRADE GRADE POINTSA 4B 3C 2D 1F 0FOR EXAMPLEYou got “A” grade in Computer Programming theory course and the credit hours are 3.So your earned grade points=4*3=12 Similarly if you get “C” grade in another subject e.g., Computer Fundamentals and the credit hours are also 3 here. Now earned grade points = 2*3=6If you get “B” grade in Circuit and Systems theory and the credit hours are 3. So yourearned grade points=3*3=9 Now your GPA = (12+6+9) / 9 = 3The purpose of each function should be documented? The purpose of each while-loop should be documented? The program runs def main(): totalBottles = 0 counter = 1 todayBottles = 0 totalPayout = 0 keepGoing = "y" while keepGoing.lower() == "y": totalBottles = getBottles() totalPayout = calcPayout(totalBottles) printInfo(totalBottles, totalPayout) print("Do you want to enter another week’s worth of data?") print("(Enter y or n)") keepGoing = input() def getBottles(): NBR_OF_DAYS = 7 totalBottles = 0 todayBottles = 0 counter = 1 while counter <= NBR_OF_DAYS: print(f"Enter number of bottles returned for day #{counter}:") todayBottles = int(input()) totalBottles += todayBottles counter += 1 return totalBottles def calcPayout(totalBottles): PAYOUT_PER_BOTTLE = .10 totalPayout = totalBottles * PAYOUT_PER_BOTTLE return totalPayout def printInfo(totalBottles, totalPayout):…