Write a program in C++ that will authenticate a password of 7586, if it is correct it prints "login is ok" and otherwise prints "login is wrong" using one of the conditional statements? *
Q: Privacy and data protection in mobile apps are important considerations.
A: Introduction: Privacy and data protection in mobile apps are important considerations.
Q: Please make me a c++ program for following question. Create a class called Matrix that represents a...
A: Algorithm: Start Create a class named Matrix with a 2d integer array 'a' of size 3x3 as an attribut...
Q: Although it will no longer be used, please leave the earlier global variable with the initialized da...
A: I have answered this question in step 2.
Q: Without reducing, convert the following expressions to NAND logic: (i) (A+BC)D , (ii) AB+ CD(AB+CD)
A: A NAND gate is a logic gate which produces an output which is false only if all its inputs are true....
Q: Create a class diagram to model the information needs listed in each task. The Human Resource...
A: Solution: Given, The Human Resources (HR) office of a federal government agency keeps track of ...
Q: What are the guidelines for developing a user-defined identifier?
A: The definition of an identification: Identification is also a component of programming. This phrase ...
Q: b) What is the difference between (x++), (x+-), and (--x).
A: We need to describe the given operations.
Q: What factors are taken into account when creating a file structure for an operating system?
A: Typically, the different attributes for a file structure are naming, identifier, supported file type...
Q: An example of this would be the term "gigabyte."
A: An example of this would be the term "gigabyte."
Q: Justify the following statement with the help of a suitable example: “In a class hierarchy of severa...
A: A virtual function is a member function which is declared within a base class and is re-defined or o...
Q: C++ programming Question. Try to find the average speed from the velocities of ten particles(in m/s)...
A: C++ code: #include <iostream>using namespace std; int main() { float x = 10, i; float av...
Q: onstruct a subprogram that solves the differential equation set dy = g(y,t)dt dt rith the fourth-ord...
A: SUMMARY: - Hence, we discussed all the points. of
Q: In this Assignment you will use an abstract class to define, read, store, and print questions for a ...
A: SUMMARY: -Hence, we discussed all the points.
Q: C++ programming Question. Try to find the average speed from the velocities of ten particles(in m/s)...
A: Try to find the average speed from the velocities of ten particles(in m/s) which are taken from the ...
Q: A major disadvantage of binary number system is that it requires________________________.
A: A major disadvantage of binary number system is that it requires a very large string of 1’s and 0’s ...
Q: You've recently installed a new programme, but users are unable to access it remotely. Which feature...
A: Introduction: A remote application is a type of application distribution system in which the applica...
Q: ALLENGE 4.1.1: Add the two 4-bit numbers. IVITY 70.2120130.qx3zay7 Jump to level 1 Add 0 and 12 Carr...
A: In Digital Circuits, A Binary Adder-Subtractor is one which is equipped for both expansion and deduc...
Q: Exercise-4: S- BAB | AВА| В |€ B→ 00 | ɛ
A: Converted from context-free grammar to Chomsky's normal form
Q: 2. A singer voice is sampled for 4 second by an 8-bit ADC at a sampling frequency of 10 kHz. The sam...
A: Given Sampling frequency=10kHz Number of bits n=8 bits Time = 4 sec i. Bit rate = Number of bits*Sam...
Q: Define a splitstream upgrade, patch, release, and version in terms of system upkeep.
A: Introduction: System maintenance is used to help users and organizations achieve their objectives. ...
Q: Write a program that asks the user for words until the user enters a blank line, which is a return w...
A: logic:- used while True to iterate till break is not encountered. Used list to append string used...
Q: Write a class that declares a user’s hourly rate of pay and the number of hours worked. Display the ...
A: Task :- Write a Java program to calculate the gross pay, tax and net pay for given input of rate pay...
Q: sum and difference of two values) Write the C++ code for a program that allows the user to enter two...
A: #include <iostream> using namespace std; int main() { int x, y, sum, sub; cout << "Enter...
Q: Imagine two teams are playing football and the scores are tied after 120 minutes of play. Now the wi...
A: Code: teamA=0teamB=0p=0for i in range(1,6): if(teamA==3 and teamB==0): print("Team 1 wins ...
Q: umber in A and Q. Que 2.5. Also illustrate the algorithm for 2s compliment fraction by a suitable Dr...
A: Adders, counters, Boolean logic units, one/zero detectors, comparators, multipliers, error-correctin...
Q: 2) Write a Java program to display the offer, element, remove operation on the queue.
A: Start. Initialize the queue. Add the elements. Display them. Delete the element. Display after remo...
Q: Assume you wish to use WebGL to create a software that draws two types of objects: sparkly billiard ...
A: Introduction: WebGL is a JavaScript API that enables any compatible web browser to generate high-per...
Q: Task: 1. Write a C program to simulate the sequential file allocation in a very simple file system. ...
A: Solution:-- 1)The given question has required for the solution to be provided with the help of the...
Q: What additional data insights have managers gained from using Netflix tools?
A: Defined additional data insights have managers gained from using Netflix tools
Q: I. Conversion Decimal Binary Octal Hexadecimal 28 Feb 22 4037 1110110001110
A: number conversion
Q: b) Write a C++ program to calculate the squares of the numbers from 1 to 20 using user defined and p...
A: I give the code in C++ along with output and code screenshot
Q: How many comparisons would be made for each of the following 3 algorithms if the input is an identic...
A: Introduction: Selection Sort: The selection sort algorithm sorts an array by repeatedly finding the...
Q: Write code that outputs variable numExams as follows. End with a newline. Ex: If the input is: 3 ...
A: Your python code is given below with an output.
Q: Give five (5) words which can explain the concept “PREPAREDNES” and design your own concept web. Aft...
A: Catastrophe preparations: Finding, measuring, and managing associated with disasters. If you're buil...
Q: Although it will no longer be used, please leave the earlier global variable with the initialized da...
A: Clarification:-Here I have made the capacity named readEmployee(), inside the capacity I have taken ...
Q: What Role Do Users Play in the Requirements Stage?
A: The role of the customer in the requirements stage of the product development life cycle is critical...
Q: Draw a Circle that satisfies the following specifications: ▪ Point Size= 16. ▪ X = x_c = 0, Y = y_c ...
A: Draw a Circle that satisfies the following specifications: ▪ Point Size= 16.▪ X = x_c = 0, Y = y_c =...
Q: Is it possible for two network interfaces to have the same MAC address? Why do you think that is? Is...
A: Introduction: A network interface is when a computer connects to a private or public network. A netw...
Q: Write a Java program to calculate the RMS velocity of oxygen molecule at 27deg C.
A: Required:- Write a Java program to calculate the RMS velocity of an oxygen molecule at 27deg C. Appr...
Q: 2. Create a mind map with the word Information Technology as the center
A: 2. Create a mind map with the word Information Technology as the center
Q: et G: (0,1)" (0,1)"+l be defined as follows: (X1. ....x,) = (X, x, OX2, X OX2 O X3,X x2 ... x, X). P...
A:
Q: What is the code for SI/DH?
A: SI (Source Index) database SI registers (Source Index) are 16-bit index registers. It is used to con...
Q: All offices on the first floor of some organization are wired into a wiring closet on the first floo...
A: SUMMARY: - Hence, we discussed all the points.
Q: Describe the notion of a DHCP lease in detail. What is the procedure for obtaining it? What is the a...
A: Here, I have to explain in detail about DHCP and its procedure and its application tool.
Q: OOP Homework Inheritance (PYTHON) 1. Given two classes as described in Customer.py (attached) Revise...
A: class Sender: # Representing Sender and Recipient #Attributes nameSender = "" addr...
Q: collect a head before any eyes, mouth or horn can be added. ode, it is worth playing this game a few...
A: Q1: import random PARTS = {1: 'body', 2: 'tail', 3: 'leg', 4: 'head', 5: 'eye', 6: 'mouth', 7: '...
Q: Provide a brief description of four potential vulnerabilities that may be exploited by the enemy. Wh...
A: Sources of Intelligence about Vulnerabilities Vendors of Security Software Providers Governmental a...
Q: We discussed various techniques for rewriting and editing papers in this course. What is your go-to ...
A: Introduction: While you're still working on your first draught, you may start editing. It has more ...
Q: What are CSV text files, and how do they work? What is a straightforward command that can be used to...
A: CSV text files: CSV text files are comma separated files. These files are simple text files in which...
Q: Name your C++ source code file: C++PE2-2.cpp (hours worked five-day week and 252-day work year) Writ...
A: As per the question I have written code in c++.
Step by step
Solved in 2 steps with 1 images
- Need help with this c++ problem In encryption, plain text is the normal, human-readable text. Cipher text is the encrypted message. These are the two functions you'll be writing. One will encrypt plain text and the other will decrypt cipher text. void cipher(istream& in, ostream& out, unsigned key)void plaintext(istream& in, ostream& out, unsigned key) You are going to read from the parameter in and write to the parameter out. Treat the two parameters, in and out, just as you would cin and cout. In fact, if you want to encrypt the characters you type from the keyboard, and have the output appear in the console, you can just call cipher(cin, cout, 5) from your run function and everything that you type will be shifted to the right by five characters. Both of these functions are filter functions, so they will use data loops. Here is the pseudocode for the cipher() function: cipher(in, out, key):read each character (c) from inshift the character c right by keywrite c to out…Write a Java program to read in a list of integers from the user and then output the average of those integers. Make sure to handle any potential exceptions that could occur during input.Write a program that will read the file text.txt which is provided and the encryptedmessage in there. Please write back the decrypted message into the output.txt file.When you see the message in the output.txt file, you need to submit the java codefile. You need to use Rot13 class for decrypting the message. Do not need to submit in the output.txt file. file example: public class FileExample { public static void main(String[]args){ try {//create file object for input.txtFile in_file = new File("src/input.txt");//create file object for output.txtFile out_file = new File("src/output.txt"); //read the input.txt file with ScannerScanner read = new Scanner(in_file);//write the output.txt file with PrintWriterPrintWriter w = new PrintWriter(out_file); while(read.hasNextLine()){w.write(read.nextLine());} //don't forget to closew.close(); // while(scan.hasNext()){// System.out.println(scan.next());// } }catch(Exception ex){ex.getStackTrace();}
- Write a program that stores names and phone numbers from a text file in adictionary, with the name being the key. Write a method that does a reverselookup, that is, finds a name given a phone number. Write a Windowsapplication to test your implementation. code in c#Write a C++ program that will compute the values of r, s, and h given v, w, and z. Use the given formulas: r = ??2/16(?/3+? + log ?) s = 1/2 √2??(?3+ 1) h = ??/3 (2? + ?)1/3 (See attached picture)Here is the code that needs to be debugged, Ive done most of it but I think there is a problem in the logic that I cant find: // Program describes two files // tells you which one is newer and which one is larger import java.nio.file.*; import java.nio.file.attribute.*; import java.io.IOException; public class DebugThirteen1 { public static void main(String[] args) { Path file1 = Paths.get("/root/sandbox/DebugDataOne1"); Path file2 = Paths.get("/root/sandbox/DebugDataOne2.txt"); try { BasicFileAttributes attr1 = Files.readAttributes(file1, BasicFileAttributes.class); System.out.println("File: " + file1.getFileName()); System.out.println("Creation time " + attr1.creationTime()); System.out.println("Last modified time " + attr1.lastModifiedTime()); System.out.println("Size " + attr1.size()); BasicFileAttributes attr2 = Files.readAttributes(file2,…
- Write a program in C to decrypt a cipher text using Caesar Cipher substitution method.Plain text was first encrypted with a Cipher Key within the range 1 to 26 and then encrypted then encrypted with key -1 (minus 1).Find the first key and write the key numbers and the decrypted plain text into text mode file "done.txt" using your programwrite a c program Count Dracula buys blood from the public. But since he prefers certain types to others, he pays as follows: Type Rate/liter A P 3000.00 B P 1800.75 C (for AB) P 2880.25 O P 1500.00 Write a C program to input a client’s blood type and the volume (liter) of blood extracted. Output how much the client will be paid.Write a program that prompts the user to enter a Social Securitynumber in the format DDD-DD-DDDD, where D is a digit. Your program shouldcheck whether the input is valid. Here are sample runs: Enter a SSN: 232−23−5435 ↵Enter232−23−5435 is a valid social security number
- Write a Java program that prompts the user to enter a password that matches a specific pattern using a single regex statement as covered in your textbook. Your program must approve the user's entry.. Here is the pattern, in this order: 1 or more upper case letters two lower case letters 1 or 2 digits zero or 1 upper case letters any two of this group @#$%^&Java give an example with exception handled and not ha [Can this code be made to news all the way to the cheese and displayed with a "*" instead of finding the number? In C++ #include <iostream> using namespace std; int n = 5, m = 5; int visited[5][5]; int x_corr[] = {1, -1, 0, 0}; int y_corr[] = {0, 0, 1, -1}; bool checkBoundary(int i, int j) { return (i >= 0 && i < n && j >= 0 && j < m); } int returnNumberPaths(int i, int j) { if (i == n - 1 && j == m - 1) { return 0; } int ans = 0; visited[i][j] = 1; for (int k = 0; k < 4; k++) { int newi = i + x_corr[k]; int newj = j + y_corr[k]; if (checkBoundary(newi, newj) && !visited[newi][newj]) { ans += returnNumberPaths(newi, newj); } } return ans + 1; } int main(int argc, char *argv[]) { for (int i = 0; i < n; i++) { for (int j = 0; j < m; j++) { visited[i][j] = 0; }…