Write a Matlab Program that used to read and display the HbAlctest shown in figure below (Using Function) your program should contain all necessary prompt and message HbA1c Test Score HBA10 Test Score Glucose mmol/L Mean Blood mg/dL 4.0 50 26 Excellent 5.0 80 4.7 6.0 115 6.3 7.0 150 8.2 Good 8.0 180 10.0 90 215 11.9 10.0 250 13.7 11.0 280 15.6 Poor 12.0 315 17.4 13.0 350 19.3 14.0 380 21.1
Q: Some firms prefer a dispersed computer system to a centralised computer system for a variety of…
A: Intro Systems with a central hubAll users are linked to a central network owner or "server" in a…
Q: shat Con ue on about Pafermana optimizotion Poom Amdahl's low?
A: Amdahl’s law: This law was proposed back in 1965 that enhances in the single or solo processor is…
Q: Which header information is used in TCP's flow control mechanism? Şelect one: O Acknowledgment…
A: Find the answer with reason given as below :
Q: Consider the distance vector routing count-to-infinity problem. Is it possible to have a…
A: Justification: The Count to Infinity problem is caused by the routing loop in this Distance Vector…
Q: Create a file called unsorted.dat and copy (or type) the following floating point numbers into that…
A: Find the required code in C++ given as below and output :
Q: In this exercise, we will either have a circle inside a polygon for which we will calculate the…
A: You C++ program is given below as you required with an output.
Q: In software engineering, discuss the purpose and goals of prototyping.
A: Introduction Software engineering: Software engineering is a branch of engineering branch of…
Q: Please provide an informal definition of a countable set. Give examples of infinite sets that are…
A: Intro It is a mathematical model used to collect diverse things; it contains elements or members,…
Q: What does it mean to securely setup an operating system, update it, and implement rules and policies…
A: Introduction: OS Hardening: Different operating systems will have their own intricacies, but there…
Q: Perform encryption and decryption using the RSA algorithm, for the following: 1. p = 5; q = 11, e =…
A: As per our guidelines, only one 3 sub parts will be answered. So, please repost the remaining…
Q: What is routing, and how does it work in real life? In this post, we'll look at and compare two…
A: Introduction: The selection of a route across one or more networks is known as network routing.…
Q: • Perform encryption and decryption using the RSA algorithm, for the following: 1. p = 5; q = 11, e…
A: We need to perform RSA encryption and Decryption. We select two prime numbers or the values are…
Q: computer science- What are the four e-commerce supporting technologies?
A: Introduction: The four technologies that support e-commerce are as follows:
Q: You cannot create a shared pointer that does not reference an object. O True False
A: According to the information given:- We have to choose the correct option to satisfy the statement.
Q: Plot the following in a line graph
A: The question is to plot the data in a line graph. As no software is mentioned here Excel has been…
Q: describe the key advantages and shortcoming of bully algorithm?
A:
Q: Write a program that reads your birthday (day-month-year). Calculate your age in (day - month -…
A: In the above code, it has been asked to print the age in day-month-year format, in the following…
Q: Assume you're in charge of a programming staff. You've chosen to set some programming and coding…
A: Points are mentioned below: The pointer must be the same type Always try to pass a pointer to…
Q: Information technology Discuss and explain new features of cloud computing that support…
A: Introduction: Cloud computing Cloud computing allows users to access the same programs through the…
Q: fill in missing values
A: The unary bitwise complement operator is a bitwise complement operator (works on only one operand).…
Q: What kind of code is contained within the try block of a try-catch statement?
A: HI THEREI AM ADDING ANSWER BELOW PLEASE GO THROUGH IT THANK YOU
Q: What modifications should or should not be made by an organisation in the future to improve the…
A: Introduction: In a complex information system, the information is stored in a database, which makes…
Q: Write the first 20 decimal digits in base 3.
A: Write the first 20 decimal digits in base 3.
Q: Task #1: Write a JavaScript to display the following on a Web page. You should solve that with…
A: Solution: We can use fontcolor method to set font color. Code: <!DOCTYPE…
Q: What is the distinction between processor consistency and FIFO consistency?
A: Introduction: Every writing activity is broken down into smaller chunks so that reading may begin as…
Q: Your company has chosen to duplicate its product database over multiple servers in order to increase…
A: Replication of data: Data replication contributes to data security. If a tragedy strikes and one…
Q: Short answer Explain why DNS is implemented as distributed database?
A: Introduction: A distributed system for domain name and IP address resolution was devised as a…
Q: computer science - What is the primary goal of this project? "Employee Management System"
A: Introduction: Employees are the foundation of every firm, and having the right personnel management…
Q: four types of integrity controls for input forms. Which have you seen most frequently?
A: Introduction: Integrity protection guarantees that devices operate properly by rejecting incorrect…
Q: the accordion panel is a popular way to store information. What makes this interface tool so…
A: First, let us understand what is accordion panel:Accordion panel is a control element in bootstrap.…
Q: What are the uses of subnetting?
A: Intro Subnetting is a term used to describe a technique where the entire network is divided into…
Q: Consider two different implementations, P1 and P2, of the same instruction set architecture. There…
A: Here, first we will calculate execution time for both P1 and P2. And lower execution time…
Q: In C++ write a program that takes user input from consoles for integers. Enter a negative value to…
A: The solution to the given problem is below.
Q: What properties does the Logical Link Control (LLC) sublayer have?
A: Introduction: The Logical Link Control (LLC) defines the software processes that provide network…
Q: Discuss briefly the various sorts of interrupts, and explain how interrupts are crucial to the…
A: Interrupt and it's type Interrupt is a signal sent to the CPU by hardware or software, normally I/O…
Q: Discuss the issues involved in database security, in particular issues specific to database systems.
A: INTRODUCTION: Here we need to tell the issue involved in database security.
Q: When we have volatile memory in the form of RAM (Random Access Memory), why do we need cache memory?…
A: Given: When we have volatile memory in the form of RAM (Random Access Memory), why do we need…
Q: What is the advantage of utilizing stack when backtracking to solve N-Queen's problem?
A: Intro Problem with the N-Queens. The goal of the N - Queens problem is to arrange n - queens on an…
Q: What are some of the challenges and concerns when using a non-integrated system?
A: challenges and concerns when using a non-integrated system
Q: What are the security objectives of IPSec?
A: Introduction: IPSec's security objectives are as follows:
Q: The instruction format for the SHL instruction is: SHL destination, count Working with a 32-bit…
A: SHL destination, count working with 32 bit operand, what are the bounds for the count value
Q: Using a diagram, explain the prototype model. What are the benefits, drawbacks, and applications of…
A: Prototype Model:- In this model, a prototype of the system required is built. The early output is…
Q: build a program topic - scientific calculator
A: Introduction: Here we are required to build a program for a scientific calculator. Since no specific…
Q: xplain the idea of a system model. What concerns should be taken into account while designing basic…
A: Introduction: The impact or flow of information between modules is represented as an influence or…
Q: Write a program that reads the student information from a tab separated values (tsv) file. The…
A: The Answer start from step-2.
Q: Consider the following scenario: you'd want to hire a contractor to produce a software package that…
A: Software is used in calculator: OpenOffice's spreadsheet software is called Calc. This includes…
Q: What have been the most recent cyber-attacks against the Internet of Things?
A: Introduction: The following are the most recent Internet of Things attacks:- Homes with smart…
Q: Computer science What are some of the most prevalent software-related issues?
A: Introduction: Unexpected behaviour or erroneous results are caused by software bugs. A software bug…
Q: Write a code that contains a tuple of first name and another set contains a list of the last name,…
A: NOTE: Since programming language is not mentioned. Therefore answering the question in Python…
Q: In C++, what is the difference between static and dynamic memory allocation?
A: Introduction: Memory allocation is a process of giving a space in the memory area for the variable…
Step by step
Solved in 2 steps with 5 images
- Write a Matlab Program that used to read and display the HbAle test shown in figure below. Your program prompt and messages. should contain all necessaryWrite a MATLAB function sumOddInts(). sumOddInts should return the sum of all odd integers between the values provided to the two parameters, inclusive, e.g., sumOddInts(5,9) should return 21. start and finish do not have to be odd, e.g, sumOddInts(4,8) should return 12. start and finish do not have to be positive, e.g., sumOddInts(-5,7) should return 7, However, finish may be assumed to be greater or equal to start. whereas Python has a modulo operator "%", MATLAB has a built-in mod() function that returns the remainder. For instance, >> mod (13,5) ans = 3>> mod (13,2) ans = 1In Matlab and octave, "rand" built in function gives a random number between 0 and 1. "Type rand and see that a number is returned between 0 and 1". Using the rand function write a script that. Write a script that generates random numbers between 0 and 10 using the rand function. The script must also tells the user if the produced random number is bigger than 5 or equal or less than 5. Such as: X>5 "The number is bigger than 5" X
- Write a MATLAB program that calculates the volume and area of sphere with using the switch-case structure. Use r=1 for the area and r=2 for the volume. (If a value -as an input- other than 1 or 2 is entered, the program should give the message "You made the wrong choice".)Write a MATLAB program that will generate a surface plot of the mass of a conic surface. Theconic surface is defined by ? = 2√?2 + ?2 for 0.5 ≤ z ≤ 4 and the mass is related to z by ? =6 − ? . The plot should have an appropriate title and axis labels.This problem is best solved using cylindrical polar coordinates (r, θ, z) rather than rectangularcoordinates (x, y, z) for the underlying grid. Use z and θ for creating the initial grid, a grid for rcan then be computed from the z and θ grids, grids for x and y can be computed from the r and θgrids, and m can be computed from z grid. Plot m versus and x and y for the surface plot.Make a program in Google Collab that integrates the function f(x) = ex from x1=-1 to x2 = 1 as the interval. Screenshot the codes
- write a MATLAB function which takes an EEG recording similar to the sample data as input and prints out a message stating which class the data belongs to.Write a MATLAB function called convtd() to convolve a signal with a kernel in the time domain. It should have two input arguments: an input signal (a vector) and a kernel (also a vector). It will return the vector that results from the convolution, which should be the same length as the input signal. The function will use a sliding window approach very similar to the bxcar() example from class. The first thing you should do is validate your inputs. Make sure both are vectors (use the isvector() function for this). Also, make sure the kernel has an odd number of elements. To do this, use the rem() function to make sure that there is a nonzero remainder when the length of the kernel is divided by 2. If either of these checks fails, use the matlab error() function to print an error message and immediately exit the function. Next, figure out the half-width of the kernel (the w variable in bxcar()). You are now ready to write the loop in which you "slide" the moving window across the…Write a function in MATLAB that has two inputs: - A shear load (as the first input) - A tensile load (as the second input) Have your function return one output, a string with the name of the lowest grade material from Table 1 that can handle those loads.
- (Program) Write a program that tests the effectiveness of the rand() library function. Start by initializing 10 counters, such as zerocount, onecount, twocount, and so forth, to 0. Then generate a large number of pseudorandom integers between 0 and 9. Each time 0 occurs, increment zerocount; when 1 occurs, increment onecount; and so on. Finally, display the number of 0s, 1s, 2s, and so on that occurred and the percentage of time they occurred.Given the function prototype,Function [out] = examfcn (in) Using MATLAB, write four (4) different calls to the function, each of which uses a distinctly different method to provide a value for the required parameter. Assume any variables that you need are available.Write a Matlab code and attach the output. Its urgent please