Write a program that will send notification to Warehouse Manger when the inventory of an item become less than 2. If the quantity of the item is greater than 2 then it will display a message of "It's sufficient! Number of items is ", if not, it will send a notification "Need to purchase , quantity is low!". Sample 1: Enter the product name: Mechanical Pen Number of items in inventory: 2 Notification: Need to purchase " Mechanical pen", quantity is low!
Q: Briefly explain 4 enterprise system data and how they apply to an organisation
A: Enterprise information is the entirety of the advanced data moving through an association. This…
Q: Consider the kind of wireless connection you'd want to use, WAN. What distinguishes this option from…
A: A wide area network is a data network usually used for connecting computers that spans a wide…
Q: Using security engineering approaches, explain the DDoS attack in detail (Use-Case diagram and…
A: DDoS stand for "Distributed Denial of Service Attack" and it is a cybercrime in which the attacker…
Q: What do you call the structure or form of expressions, statements, and program units?
A: The structure or form of expressions, statements, and program units is called syntax
Q: Debate the type of relationship between internal and external IT auditors when it comes to…
A: Introduction: Internal audit is a company's department that monitors the efficiency of its…
Q: What does the color RGB stand for?
A: RGB is also known as Red, Green and Blue.
Q: Describe the benefits of polymorphism in Java. Do they have any drawbacks? List them if you have…
A: INTRODUCTION: Polymorphism is a basic notion in object-oriented programming (OOP) that covers…
Q: Identify the tools and technologies that are used to facilitate project management in the…
A: IT project management is an process for coordinating, arranging, and ensuring transparency in the…
Q: For the following simple graphs G=(V,E) (described by their vertex and edge sets) decide whether…
A: Here, we are going to check whether given two graphs are bipartite or not.
Q: Job portal system: This system allows the students to search and apply for jobs etc. online. The…
A:
Q: In what ways may you benefit from using routeing metrics?
A: Introduction: Routing is the process of selecting a path for traffic inside a network and between…
Q: What are the various types of computer systems, and what are some instances of each?
A: Introduction: A computer is a machine that converts raw data into useful information. It interprets…
Q: What is the functional operations of microprocessor
A: Given To know about the functional operations of microprocessor.
Q: Write a program in C++ to find the sum of only positive numbers out of 10 integers entered using the…
A: Continue statement is used to skip the current iteration of loop without terminating loop…
Q: Derive the truth table, simplified Boolean function (equation), and draw the logical diagram.…
A: Answer
Q: Djikstra's link state algorithm: Consider the 6-node network shown below, with the given link costs.…
A: Dijkstra's algorithm is a link-state algorithm that computes the least-cost path from one node to…
Q: What are the various types of computer systems, and what are some instances of each?
A: Introduction: A computer system is a group of linked devices that process, store, and input data and…
Q: For the following simple graphs G1=(V1,E1) and G2=(V2,E2) (described by their vertex and edge…
A: Given that, Graph G1 contains 5 vertices {a,b,c,d,e} and the edges {ab,ad,ce,cd,cb,bd,be}. The graph…
Q: Which of the following Boolean expressions correctly represents the logic circuit below? a. M1 = (P…
A:
Q: Though there are security and privacy concerns with IoT, it adds values to our lives by allowing us…
A: Introduction Though there are security and privacy concerns with IoT, it adds values to our lives by…
Q: Describe the Entity-Relationship model and its role in a database.
A: In this question we have to understand Entity Relationship model in database. Lets understand the…
Q: Explain the difference between synchronous and asynchronous transmissions. Is there a scenario where…
A: The Answer is in given below steps
Q: What skills do you think are needed in the call center industry
A: 1. Lucidity in CommunicatingKeeping discussions clear and useful aides both in settling clients'…
Q: Describe the mechanism through which a current operating system makes use of a feature from an older…
A: Introduction: Between 1963 and 1969, the Massachusetts Institute of Technology (MIT), General…
Q: Ada Lovelace was both a cryptographer and a computer programmer, but how would you classify her?
A: What is the difference between programming and cryptography? Computer programming is the process of…
Q: What is the name of the SSH client file that an administrator can use to pre-configure the public…
A: Secure Shell is a cryptographic organization standard for securely exchanging data across an…
Q: Write a program that opens a file in read-only mode and maps the entire file into the virtual-memory…
A: Opens the file in read-only mode and checks for the presence of the character X. If X present,…
Q: Why is it so important to secure online applications? What could possibly go wrong with an…
A: Securing web applications Web application security testing verifies that the information system is…
Q: Which programming principle indicates that code should be stored in the same structure as the data…
A: INTRODUCTION: The proper phrase for the object-oriented programming principle states that code…
Q: Is there a company's procedure for sharing information in an incident response plan?
A: Introduction: A blueprint is a comprehensive strategy or action program. When considering a network…
Q: Derive the truth table, simplified Boolean function (equation), and draw the logical diagram.…
A: Answer
Q: Take it for granted that there isn't anything like relocatable software code. What methods can be…
A: introduction: Relocatable code is software that can have its execution address modified. In one…
Q: Write a Java application for Blizzy's car care Shop that shows a user a list of available services:…
A: In the given description the program will display the car shop that shows the services are available…
Q: doing research on the internet A look at the exploits of Mafiaboy. When and how did he begin…
A: Introduction: Michael Cale (born 1984), also known as the Mafiaboy, is the security expert and…
Q: There are a lot of questions about routeing and how it works. Recognize the distinctions between the…
A: Introduction: The practise of identifying the most effective method to visit a series of locations…
Q: Is it possible to identify and address the weaknesses of the Whetstone, Dhrystone, and Linpack…
A: SPEC CPU Benchmarks In order to set a standard that would aspire to guarantee reliability in the…
Q: Use lawful software and describe any issues that may arise
A: Introduction: Legal software is protected by copyright laws; the publisher may distribute only one…
Q: What is the best way for database designers to improve database efficiency in nnliontiono?
A: Introduction: A database is a collection of organized data saved on a computer's hard drive. When a…
Q: What are the various types of computer systems, and what are some instances of each?
A: In reality, a computer is an electrical device that accepts data and produces output. The following…
Q: Is it possible to define "Networking?"
A: Introduction: Networking: The action of transferring and sharing data between nodes across a…
Q: What are the technical feasibility for the project analysis?
A: A technical feasibility study assesses the details of how you intend to deliver a product or service…
Q: Set up an algorithm for converting a given torus with an ellipsoidal cross section to a polygon mesh…
A: FOR SOLUTION SEE STEP NO. 2
Q: In what way does the Single Audit Act work? What effect has this law had on the auditing of…
A: Act on a Single Audit: The Single Audit Act requires every organization receiving funds or grants to…
Q: Describe the mechanism through which a current operating system makes use of a feature from an older…
A: UNIX: The design and functionality of Multics have had a considerable effect on the Unix operating…
Q: Write a Java program to take a list of string from the user & print a list where each string has all…
A: In this question, we are asked to write a java program to remove s from the user input string,…
Q: When using a secure connection protocol such as SSL or TLS, can connections between a web browser…
A: Transport Layer Security (TLS), now securely secured Secure Sockets Layer (SSL), is a cryptographic…
Q: Q7: What is the difference between register BL and port A?
A: Q 7: What is the Difference between register BL and port A? Answer: The Difference between register…
Q: Write a Java program to take a list of string from the user & print a list where each string has all…
A: Code: import java.util.*;public class StringReplace { public static void main(String args[]) {…
Q: Several editing and rewriting techniques were discussed in this course. What is your most often used…
A: Characteristics of revision and editing: The two most critical aspects of the writing process are…
Q: The efficiency of e-commerce has been boosted by two or more computer innovations.
A: Introduction: Companies may grow into new regions by using this distribution channel. E-commerce…
Step by step
Solved in 4 steps with 3 images
- Implement a program that calculates the bill of a sandwich stand. The program should ask theuser to enter the quantity of each of the items. Then compute 13% GST on the total amountand generate a bill with items, their quantity along with price of each item and the total(inclusive GST). The stand has the following items:- Petti for $2.50- Drink for $1.25- Extra cheese topping for $1.25Write a program that can suggest an activity based on the temperature. If the temperature is between 20 to 40 degrees Fahrenheit, suggest the user go skiing; if the temperature is between 41 to 60 degrees Fahrenheit, suggest the user go hiking; if the temperature is in the range of 61 to 80, suggest swimming. For all the temperatures out of these ranges (too cold or too hot), then suggest staying inside.Write a program that asks the user for a line of text and counts how many spaces, periods, or commas the text contains. Ex: If the input is: Listen, Mr. Jones, calm down. the output is: There are 4 spaces, 2 periods, and 2 commas.
- Write a program that prints the numbers from 1 to 100 (inclusive), one per line. However, there are three special cases where instead of printing the number, you print a message in its place:1. If the number you would print is divisible by 3, print the message: Better three hours too soon than a minute too late.2. If the number you would print is divisible by 5, print the message: Where do you see yourself in five years?3. If the number you would print is divisible by both 3 and 5, instead print out: In the future, everyone will be world famous for 15 minutes.Make sure to print the exact strings given above!Write a program that converts a time from 24-hour notation to 12-hour notation. The following is a sample interactionbetween the user and the program. Enter time in 24-hour notation:13:07That is the same as 1.07 PMAgain? (y/n)y Enter time in 24-hour notation:10:15That is the same as 10:15 AMAgain? (y/n)y Enter time in 24-hour notation:10:65There is no such time as 10:65Try again:Enter time in 24-hour notation:16:05That is the same as 4.05 PMAgain? (y/n)nEnd of program Define an exception class called TimeFormartException. If the user enters an illegal time, like 10:65or even gibberish like &&*68, your program should throw and handle a TimeFormatException.Write a program that plays a guessing game with the user. The user should pick a letter, and the computer should try to guess the letter. After each guess, the user should tell the computer whether its guess was too high or too low. With this information, the computer should be able to guess the letter within five tries. The user should be able to give whole words or single upper or lower case letters as responses. c++
- Write a program that plays rock paper scissors against the user. Ask the user for what they want to throw (rock, paper, or scissors) and then have the computer randomly pick their throw. Then check to see who wins (or if it’s a tie). You can interpret 1 as rock, 2 as paper, and 3 as scissors if you’d like (or any other combination of numbers). 2. Craps is a dice game played at many casinos. A player rolls a pair of normal six-sided dice. If the initial roll is 2, 3, or 12, the player loses. If the roll is 7 or 11, the player wins. Any other initial roll causes the player to roll for point. That is, the player keeps rolling the dice until either rolling a 7 or re-rolling the value of the initial roll. If the player re-rolls the initial value before rolling a 7, it’s a win. Rolling a 7 first is a loss. Write a program to simulate multiple games of craps and estimate the probability that the player wins. For example, if the player wins 249 out of 500 games, then the estimated probability…Write a program that will figure out the required change for a purchase. Start by asking the user for the price of the product and the amount paid. (We are expecting that the user will give a larger value for the amount paid.) Read in each of these values as a double. Report back to the user the number of each denomination of change due. You are not just telling the user the amount of money he gets back. Hint: Working with integers is much easier. The modulo operator is your friend for this assignment. Also, note that pennies can be tricky due to the poor real number to binary conversions. (Remember that 1.00 could actually be stored as 0.9999999999997.) Do not include five-dollar bills, ten-dollar bills, etc. Only show coins and one-dollar bill amounts. Be sure to test multiple values. There is a test case below. Your program should run the test case exactly as it appears below, and should work on any other case in general. Output Example (User input is marked with >>>.…In python, a) In the Hi-Lo game, the player begins with a score of 1000. The player is prompted for the number of points to risk and a second prompt asks the player to choose either High or Low. The player’s choice of either High or Low is compared to a random number between 1 and 13, inclusive. If the number is between 1 and 6 inclusive, then it is considered “low”. A number between 8 and 13 inclusive is “high”. The number 7 is neither high nor low, and the player loses the points at risk. If the player had guessed correctly, the points at risk are doubled and added to the total points. For a wrong choice, the player loses the points at risk. Create a HiLo application based on this specification. Application output should look similar to b) Modify the application to allow the player to continue until there are 0 points left. At the end of the game, display the number of guesses the user took before running out of points.
- Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the output is either heads or tails. Assume the input is a value greater than 0. Ex: If the input is: 3 the output is: heads heads tails import randomdef heads_or_tails(number_of_flips): i=0 while i<number_of_flips: temp=random.randint(0,1) if temp: print("tails",end='') print() if temp==0: print("heads",end='') print() i=i+1 if __name__ == '__main__': random.seed(1) number_of_flips = int(input()) heads_or_tails(number_of_flips) it says heads_or_tails() input 1 TypeError: heads_or_tails() missing 1 required positional argument: 'number_of_flips' heads_or_tails() input 5 TypeError: heads_or_tails() missing 1 required positional argument: 'number_of_flips' heads_or_tails() input 10 TypeError: heads_or_tails() missing 1 required positional argument:…Write a program that coverts a zip code to a bar code. The bar codes use large and small bars. We will use : as a small bar and | as a large bar. Each digit has its own bar pattern. 1 is :::|| 2 is ::|:| 3 is ::||: 4 is :|::| 5 is :|:|: 6 is :||:: 7 is |:::| 8 is |::|: 9 is |:|:: 0 is ||::: The barcode also includes a check digit. The final digit added to the bar code verifies the previous numbers are correct. To Determine the checksum: Add all the digits together Determine what needs to be added to make the total a multiple of 10 The bar code also always starts and ends with a large bar. This is used by the scanner to align the letter. Drexel's Zip Code is 19104 The check digit is 5. The sum of the digits is 1+9+1+0+4 = 15. To make 15 a multiple of 10, we need to add 5. The bar code will be |:::|||:|:::::||||::::|::|:|:|:| The majority of work in this problem is done by digit. It makes sense to store the zip code as a string, not as an integer. Write the function checksum(zip)…Write a program that coverts a zip code to a bar code. The bar codes use large and small bars. We will use : as a small bar and | as a large bar. Each digit has its own bar pattern. 1 is :::|| 2 is ::|:| 3 is ::||: 4 is :|::| 5 is :|:|: 6 is :||:: 7 is |:::| 8 is |::|: 9 is |:|:: 0 is ||::: The barcode also includes a check digit. The final digit added to the bar code verifies the previous numbers are correct. To Determine the checksum: Add all the digits together Determine what needs to be added to make the total a multiple of 10 The bar code also always starts and ends with a large bar. This is used by the scanner to align the letter. Drexel's Zip Code is 19104 The check digit is 5. The sum of the digits is 1+9+1+0+4 = 15. To make 15 a multiple of 10, we need to add 5. The bar code will be |:::|||:|:::::||||::::|::|:|:|:| The majority of work in this problem is done by digit. It makes sense to store the zip code as a string, not as an integer. Write the function checksum(zip)…