Write a program to extract Web address starting with www. and ending with .my. The program displays Web addresses contained in the input entered by the user. Sample output 1: Please input a string with URL address such as "http://www.programming.com\ http://www.unimap.edu.my www.unimap.edu.my
Q: It is not possible to achieve inheritance of structures in ?++C
A: Introduction: Below describe the whether it possible or not to achieve inheritance of structures in…
Q: extensible stylesheet language transformation (XSLT)?
A: Extensible Stylesheet Language Transformations (XSLT) is also called XSL (Extensible Stylesheet…
Q: Digital data and a digital gadget are two phrases that are sometimes used interchangeably.
A: Digital Device: An electronic device that receives, transmits, stores, and processes digital data;…
Q: Question 1. Find the shortest paths from a vertex with the remainder when the last digit of your…
A:
Q: A computer's von Neumann architecture consists of three elements. In order to perform a broad…
A: According to Neumann Architecture, the key components and their visibility change depending on the…
Q: Identify The underlying causes of many catastrophic software failures in the history of computer…
A: FAILURES OF IMPORTANT SOFTWARE: Some of the most egregious software failures in computer science…
Q: Is today's technology being used to its full potential in the field of effective communication?
A: Technology can improve everyday life, from consumer electronics to mobile devices and computers.…
Q: Explain the concept of a real-time operating system using examples. Is there anything that sets this…
A: Intro Operating systems designed for real-time applications must manage data and events that are…
Q: A computer's operating system may be differentiated from other operating systems by providing a…
A: Introduction: Operating System (OS):
Q: It's critical to understand what a computer's operating system can accomplish.
A: Introduction: The application's main purpose is to manage computer resources on a computer system,…
Q: Write a C++ program that finds the following form using a while loop 0 12 345 6789
A: #include <iostream> using namespace std; int main(){ int rows = 4, cols = 4, num = 0;…
Q: Is it feasible to have the same MAC address on two distinct devices? Whether or whether this will…
A: Your computer has a MAC (Media Access Control) address, the same as its hardware number. This…
Q: What is a reference point's location, and how does it aid in memory access?
A: POINTERS Variables have been explained as locations in the computer's memory which can be accessed…
Q: Operating systems and most applications don't launch bug-free. Applications contain tens of…
A: A company may protect its clients from risk and carelessness by taking the following steps: 1.…
Q: When developing a mobile application, what challenges of administration, organization, and…
A: We must write down the difficulties that must be handled by management, organisation, and technology…
Q: It is vital to weigh the benefits and drawbacks of wireless networking before deploying it. Should…
A: Wireless networks are computer networks that are joined or connected without the use of cables.…
Q: dy find an approximate value of y corresponding to x = 1.4 given = xyz and x-1 & y-1 with 4 decimal…
A: Given:- dy / dx = xy1/2 and x=1 and y=1
Q: Examine the evolution of the internet and the technologies that underpin it.
A: Introduction: As the fundamental technology, this question explains the evolution of the internet.
Q: What is the mechanism behind two-factor authentication? In what ways does it assist to protect…
A: Two factor authentication is a security measure to protect a system from unauthenticated person who…
Q: How would you define an XML schema?
A: let's see the correct answer of the question
Q: In your opinion, what are the top five email dos and don'ts, and how would you go about illustrating…
A: An email account is the relationship with the email service, and all the storage, features and the…
Q: . What is the result of scrambling the sequence 11100000000000 using the following scrambling…
A:
Q: * Root vertex in a derivation tree must be .labeled by the start symbol True O False O Instantaneous…
A: Answer is in next step
Q: Do you think it's feasible for two network interfaces to share a MAC address? Are there any…
A: Launch: A network interface is used when a computer connects to a private or public network. A…
Q: Provide an illustration of what you mean when you talk about software requirements analysis.
A: Introduction: The process of establishing user expectations for a new product is known as…
Q: When used correctly, polymorphism will never require changes to be made to any part of the .program
A: Explanation- Polymorphism is a word made up of two greek words "Poly" and "Morphs” . "Poly" means…
Q: Mobile technology implementation presents a variety of difficulties. Do web-based solutions really…
A: Securely deploying mobile devices: Organizations must decide whether or not employees are permitted…
Q: When we hear the term "operating system," who or what do we infer? What are the two primary…
A: Operating System is a system software present in the computer, which act as interface between the…
Q: Can you name and describe in detail at least five of the most common drawbacks associated with cloud…
A: Cloud computing eliminates the need for enterprises to have their own data centers by reducing the…
Q: Explain how to create software in a structured, object-oriented, and agile manner.
A: The Answer is in given below steps
Q: :Select the correct answer * :PDA can be represented with the help of Instantaneous description…
A: Here is the solution:
Q: e a label and 4 buttons. Initially, your label will display number 0. Use one button to change the…
A: We need to create the JFrame for counter program as per the given description.
Q: Which among the following best describes polymorphism
A: Answer for the mcq question is given below with explanation. question is- Which of the following…
Q: In one move a Turing machine, depending :upon The symbol scanned by the tape head O The state of the…
A: Dear learner , hope you are doing well , I will try my best to answer this question. Thank You!!
Q: Q1/an A-Write a program to compute the drag force F, (in Newton) When a body swims through fluid,…
A: Logic:- Given values of p=1000 vinf=1.25 A=0.25 Cd=0.09 We have to calculate Fd, Given formula:-…
Q: ontrast Von Neumann Architecture with the Little Man computer. How does
A: Introduction: Below the describe and Compare and contrast Von Neumann Architecture with the Little…
Q: programming in C++ is that once
A: I have created three classes Main, BankAccount and Bank BankAccount: this class holds the details of…
Q: Is there a difference between normal and associative memory? Which is the more expensive option, and…
A: Introduction: Participants' remembering of unrelated item pairings, such as face-name pairs, is…
Q: * Which among the following is not true ?for polymorphism Ease in readability of program O It is…
A: Which among the following is not true for polymorphism? Increases overhead of function definition…
Q: Give an example of how a computer's CPU might impact its overall performance.
A: CPU: CPU stands for central processing unit and is also known as a processor. It is an electrical…
Q: The following instruction is in valid form (legal form) SUB DH,1234 Select one: True False
A: The question has been answered in step2
Q: 1. The following (Name, Race, Stats) are the information needed for character creation in a RPG…
A: //code in java package game;import java.util.*; abstract class Name{ abstract String pname();…
Q: For people who work in the technology industry, understanding the fundamentals of basic electronics…
A: The internet of things, or IoT, is a system of interrelated computing devices, mechanical and…
Q: It is recommended they use SAP GUI for HTML. This allows you to integrate classic Dynpro-based…
A: The question is to find the given statement is true or false.
Q: how many different ways the data may be interpreted How can a network get certified as effective?…
A: Data interpretation: The process of reviewing data and drawing pertinent conclusions while using a…
Q: Time (Seconds) 0.250 0.200 0.150 0.100 0.050 0.000 200 400 600 Number of Vehicles 800 1000
A: NOTE: Kindly use installed matlab compiler to evualute the output you get the same output.…
Q: What do you do if two computers on your local network have the same MAC address? That's a brilliant…
A: Computers on your local network: Is it conceivable that a conflict over a MAC address could arise…
Q: Which method does Ubuntu use to get an IP address? Please provide a rationale for what you're…
A: IP Address of Ubuntu Server The configuration of an IP address on an Ubuntu server necessitates the…
Q: (LOOP 100) WILL TRANSFER THE EXECUTION TO 100 ONLY IF Select one: a. CX=0000 AND THE COMPARISON…
A: Option 'B' is correct Answer. CX=0000 AND THE COMPARISON OPERANDS ARE EQUAL. Explanation :- The…
Q: Newton-Raphson method to approximate the cube root of 10 to two places after the Start
A: We need to compute the
Step by step
Solved in 3 steps with 4 images
- python homerwork Select the correct script to write 'Hello!' in the file sample.txt for the command line argument python myscript.py sample.txt Hello!? a. f = open(sys.argv[2], 'w') f.write(sys.argv[3]) f.close() b. f = open(sys.argv[1], 'a') f.write(sys.argv[2]) f.close() c. f = open(sys.argv[2], 'w') f.write(sys.argv[1]) f.close() d. f = open(sys.argv[1], 'r') f.write(sys.argv[2]) f.close()Review the following program: import urllib.request, urllib.parse, urllib.error fhand = urllib.request.urlopen('http://data.pr4e.org/romeo.txt') counts = dict() for line in fhand: words = line.decode().split() for word in words: counts[word] = counts.get(word, 0) + 1 print(counts) 3.1 Provide an explanation for EACH line of the following program. 3.2 Run the above program and include a full window screenshot with system time and date in the answer. 3.3 Run the above program with https://www.py4e.com/code3/romeo-full.txt and include a full window screenshot with system time and date in the answer.Write a program in python that can fetch the top 1000 news articles from Google news and then search each individual news article title up in bing.com every 11 minutes. Remember when the program activates the local computer browser to search the news article up every 11 minutes. After each search the program should terminate the local computer browser and then reopen it and this can prevent 1,00 browser tabs from being open and taking on a lot of ram.
- For Python, using IDLE Write a program to read in a web page, process the data, and write out the quotes to the screen called _PA32 that will scrape the webpage https://quotes.toscrape.com/page/2/ onto your program screen. Make sure to include your student id in the first print statement of the program and output the parsed quotes with their authors. Create a function named readwebpage which opens the url https://quotes.toscrape.com/page/2/ parses the data using a second function and the outputs the quotes and authors using a 3rd function. Take a screenshot of your completed program and another of your outputCreate a three address statement and convert the three address statement into machine code fromthe following snippet of program input:int i, a, b;a=0;b=0;for (i=10; i>0; i=i--){if (a%2 ==0 && a<b) b = b + 4;else b = b + 5;}Trace the following Code and then print the output. msg db 'hello world$' newline db 10,13,'$' buffer db 10 dup mov ah,9 mov dx,offset msg int 21h ;new line mov ah,9 mov dx, offset newline int 21h ;enter a string from the keyboard lea dx,buffer mov ah,0ah int 21h ;new line mov ah,9 mov dx,offset newline int 21h ;adding the $ symbol at the end of the string mov bx,0 mov bl,buffer[1] mov buffer[bx+2],'$' mov ah,9 mov dx,offset buffer+2 int 21h
- Write an address book program that stores your contacts' names and their email addresses. The names and email addresses are originally stored in a file called phonebook.in, in the format: Harry Potter t..d@hogwarts.edu Hermione Granger b..h@hogwarts.edu Ron Weasley r..b@hogwarts.edu Draco Malfoy m..s@hogwarts.edu Severus Snape h..e@hogwarts.edu Albus Dumbledore a..x@hogwarts.edu Your program should read from the file, storing the names and corresponding email addresses in a dictionary as key-value pairs. Then, the program should display a menu that lets the user enter the numbers 1 through 5, each corresponding to a different menu item: 1) look up an email address 2) add a new name and email address 3) change an email address 4) delete a name and email address 5) save address book and exit When the user enters 1, the program should prompt them for a name, and then print the corresponding email address. If there is no dictionary entry under that name, the program should print, "Sorry,…Write a program in python that can fetch the top 1000 news articles from Google news everyday and then search each individual news article title up in bing.com every 11 minutes. Remember when the program activates the local computer browser to search the news article up every 11 minutes. After each search the program should terminate the local computer browser and then reopen it and this can prevent 1,00 browser tabs from being open and taking on a lot of ram. Please write full code.Write an address book program that stores your contacts' names and their email addresses. The names and email addresses are originally stored in a file called phonebook.in, in the format: Harry Pottertheboywholived@hogwarts.eduHermione Grangerbrightestwitch@hogwarts.eduRon Weasleyroonilwazlib@hogwarts.eduDraco Malfoymyfatherwillhearaboutthis@hogwarts.eduSeverus Snapehalfbloodprince@hogwarts.eduAlbus Dumbledorealasearwax@hogwarts.edu Your program should read from the file, storing the names and corresponding email addresses in a dictionary as key-value pairs. Then, the program should display a menu that lets the user enter the numbers 1 through 5, each corresponding to a different menu item: 1) look up an email address2) add a new name and email address3) change an email address4) delete a name and email address5) save address book and exit When the user enters 1, the program should prompt them for a name, and then print the corresponding email address. If there is no dictionary entry…
- Write a C++ Allegro program, which runs in Dev C++, which uses only Allegro geometric function calls (no pre-existing bitmaps or graphics files): 1. generates an 800x800 initial black window 2. draws a white hypno-spiral like the below 3. Make sure that the black lines are exactly 5 pixels thick and the white lines are 7 pixels thick. No Archimedes spiral; keep lines parallel lines(d) Using a single print command, print the list of odd entries in x and then the list ofeven entries in x .( python code)Many user-created passwords are simple and easy to guess. Write a program that takes a simple password and makes it stronger by replacing characters using the key below, and by appending "q*s" to the end of the input string. i becomes ! a becomes @ m becomes M B becomes 8 o becomes . Ex: If the input is: mypassword the output is: Myp@ssw.rdq*s How do I write this in C++