4.) A certain CS professor gives 5-point quizzes that are graded on the scale 5-A, 4-B, 3-C, 2-D, 1-F, 0-F. Write a program that accepts a quiz score as an input and prints out the corresponding grade. (You must use a list.)
Q: Explain how predictive analytics works and provide an example of how it might be put into practise…
A: Explanation: Prescriptive analytics is a technique that analyses data and makes appropriate…
Q: 21. Draw the logic symbol and develop a truth table for a 2 input NAND gate. 22. Draw the logic…
A: The Logic Symbols & Truth Tables for 2 Input NOR & NAND Gate are given in the Step 2
Q: Name the three categories of crimes against the corporation and describe each. Provide an example…
A: The question instructs to mention the three categories of crimes against corporate and describe each…
Q: Explain to a customer, while you are conducting an inquiry, the differences between personal ethics,…
A: Personal, professional, and computer ethics differ from one other in the following ways: Personal…
Q: What is the significance of wildcard and serialisation?
A: Introduction: The following are the traits that set a mobile app apart: It is critical to determine…
Q: 7. Find a closed form representation for the function defined recursively by f(1) = 10 and…
A: The recursive function is the function in the code which refers itself to the execution. Recursive…
Q: According to the ACM code of ethics and conduct, what ethical and professional norms would be…
A: Ethical issues of using facial recognition technoly are data privacy, mass surveillance etc.
Q: process Allocation max ABC 562 Be PO P1 Pz P3 P4 ABC 322 01 0 111 323 211 210 561 996 324 Avaliable…
A: A resource allocation that is use to avoid deadlock is called Banker’s algorithm. A 1-D matrix is…
Q: Which of the following lines, if any, contains a valid, though not necessarily accurate/helpful,…
A: ANSWER:
Q: What distinguishes on-premises data centre IT security solutions from cloud security approaches?
A: Introduction: When you use cloud security on a regular basis, you don't have to invest in specific…
Q: It is discussed in great length but also its impa cyberbullying the problem.
A: Introduction: Cyberbullying can happen online through social media, forums, or gaming where users…
Q: It may be useful to characterise a recent security breach involving access control or…
A: Intro A "security breach" is any occurrence that results in unauthorized access to computer data,…
Q: Create a subclass of the Employee class from Question 2 named ShiftSupervisor. Add the salary and…
A: class ShiftSupervisor(Employee): def __init__(self, name, idnumber, salary, bonus):…
Q: What makes up a computer's visual system?
A: Introduction: Computer vision is a branch of artificial intelligence that studies how computers may…
Q: There is an offer that says that he will get a 20% discount if both he and his brother are less than…
A: According to the question , we have to Write a code that prints ‘true’ if he is eligible for the…
Q: Is it beneficial for those with physical or mental disabilities to use the internet? What new…
A: Introduction Internet access improves the life of visually challenged individuals. The internet…
Q: Explain computer the methods of interprocess communication utilised in the UNIX operating system.
A: Introduction: IPC (Interprocess communication)- It is used to communicate between processes. IPC is…
Q: Examples are a great tool to use when trying to explain something. In order to do network analysis,…
A: Network Analysis Finding the voltages across and currents through each network component is the…
Q: shared-memory and distributed-memory parallel computing systems. Compare them and mention one…
A: SUMMARYThe introductory type of resemblant processing, in addition to communication- passing…
Q: Why is DNS used as a distributed database, please?
A: The reason for Domain Name Service (DNS) is implemented as distributed database: Internet uses IP…
Q: Should we use an asynchronous or synchronous bus to connect the CPU and memory? I'd want to hear how…
A: Intro We'll utilize an asynchronous or synchronous bus to connect the CPU and memory. A bus is a…
Q: Determine the time complexity function of the program snippet below, int f1(int n) { if (n = 1)…
A: The given C program is: int f1(int n) { if (n <= 1) return n; return 2*f1(n/2); } int…
Q: in Digital Signal Processing 1. Simple words for the difference between TIME DOMAIN and FREQUENCY…
A: Here we have given the differences between time domain and frequency domain. we have given a brief…
Q: What is the definition of routing? Describe in detail the main components of a router and the…
A: Introduction: Routing: Routing is simply the act of finding a path across several networks, which…
Q: What can be done to reduce the risk of identity theft?
A: ANSWER:
Q: Mechatronics 19. Draw the logic symbol and develop a truth table for a 2 input AND gate. 20. Draw…
A: 19.
Q: PROBLEM 12 The Easy Time Grocery chain operates in major metropolitan areas on the East Coast. The…
A: Answer: Attaching a single png file to cut the disturbance created by many files. Solved by Modi…
Q: T F F T L F FL A T T T T LL F LL F F F 9 F Jº T F T F T F T TI F r pvr T T T LL F T T T F W F F F T…
A:
Q: When it comes to the process of writing codes of ethics for professional organisations, we will…
A: Introduction: A professional organisation, also known as a professional association or a…
Q: List out the benefits of biometric authentication?
A: Biometric authentication: It us used to identify the person’s authentication by using physical part…
Q: To put it another way, what exactly does the term "Internet 2" entail, and how does it operate step…
A: Introduction: The Internet is a huge collection of linked computer networks that spans the globe. As…
Q: List out any two practical examples of Closed-loop control systems and explain anyone in detail with…
A: Two practical examples of Closed Loop Control Systems in real-world applications: Voltage…
Q: It is possible that the use of data analytics may help to modernise the technologies that are used…
A: Solution: Technology is significantly changing the way businesses connect with their customers, take…
Q: Why is hashing passwords rather than encrypting password files preferable?
A: Introduction: Encrypting the password is a possibility.
Q: 5. What is the output of the following code? int count = 0; do cout << count <<""; count++; } while…
A: the output for the above code will be.....
Q: Assume there is only one open seat in a class with two people registering. In a database system,…
A: Intro Database system: Database systems usually referred to as DBMS, are pieces of software that…
Q: A code 101110 need to be send to the receiver.Using Hamming code find out the code word and the…
A: Hamming code is an error detection and correction mechanism when the message is received at the…
Q: What does cloud security utilizing identity and access management (IAM) and the shared…
A: Cloud technology we are using the virtual space and the internet. Some persons thinks that cloud is…
Q: What are some examples of the many categories of issues that simulation models might be used to…
A: Introduction Simulation modelling: Simulation modelling is the process of creating and analyzing a…
Q: Write program in c++ language to implement-logic-gates (AND-OR). Without using (if condition).…
A: GIVEN: Write a C++ program to implement the logic-gates operation of the AND and OR gate. Do this…
Q: What are the benefits of object-oriented analysis, please?
A: Lets see the solution in the next steps
Q: How many select statements may be concatenated from the same table?
A: Intro The combination of similar statements increases the likelihood of a false positive (false…
Q: Is it necessary to run a simulation on a computer in order for it to have any value? Explain.
A: simulation on a computer:A computer simulation, in its most basic form, is a program that runs on a…
Q: What sets a mobile application apart from others?
A: Introduction: A wildcard character replaces one or more characters in a string. In a WHERE clause,…
Q: Create a class Time which contains: Hours • Minutes Seconds ● Write a C++ program using operator…
A: #include<bits/stdc++.h> using namespace std; class Time{ int Hours,Minutes,Seconds;…
Q: What file format are configuration files saved in to allow additions and subtractions of the files…
A: The file format are configuration files saved in to allow additions and subtractions of the files…
Q: The proliferation of digital technologies, including computers, information networks, and the…
A: Introduction: Concerning the moral and ethical implications of computer technology, information…
Q: I am trying to solve the teque kattis problem. Currently i have implemented a TailedLinkedList to…
A: The Linear Time Complexity which is O(n) depicts that, if the input grows then the program or the…
Q: What is the procedure for allocating memory? Use clear wording to distinguish between logical and…
A: Answer: Memory allocation is a process by which computer programs and services are assigned with…
Q: List The FPU contains at least three special-purpose registers.
A: Introduction: There are three registers for particular purposes in the FPU:
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 1 images
- Program 3 - List Practice Write a program that either: 1. Reads 10 integers from the user, or 2. Generates 10 integers between -10 and 10 randomly And then 1. Prints out the maximum integer 2. Print out the sum of the integers Without using built in functions such as max() or sum()python: def character_gryffindor(character_list):"""Question 1You are given a list of characters in Harry Potter.Imagine you are Minerva McGonagall, and you need to pick the students from yourown house, which is Gryffindor, from the list.To do so ...- THIS MUST BE DONE IN ONE LINE- First, remove the duplicate names in the list provided- Then, remove the students that are not in Gryffindor- Finally, sort the list of students by their first name- Don't forget to return the resulting list of names!Args:character_list (list)Returns:list>>> character_gryffindor(["Scorpius Malfoy, Slytherin", "Harry Potter, Gryffindor", "Cedric Diggory, Hufflepuff", "Ronald Weasley, Gryffindor", "Luna Lovegood, Ravenclaw"])['Harry Potter, Gryffindor', 'Ronald Weasley, Gryffindor']>>> character_gryffindor(["Hermione Granger, Gryffindor", "Hermione Granger, Gryffindor", "Cedric Diggory, Hufflepuff", "Sirius Black, Gryffindor", "James Potter, Gryffindor"])['Hermione Granger, Gryffindor',…Program definition: Write a program that simulates the game “hangman”. a. In the game of hangman, have a user enter a word for “another” player to guess. b. After the word to guess is entered, clear the screen and present a list of blanks or underscores representing unguessed letters of the hidden word. c. Have the user guess a letter in the word. If the letter is in the word, display the letter instead of the blank or underscore and display the remaining blanks or underscores for the unguessed letters, all in the proper position. d. If a previously guessed letter is repeated, whether in the word or not, another try is allowed without penalty. If a guess is incorrect, the game state progresses toward being “hung”. e. There are 8 bad guesses allowed before the game is lost. f. The game will progress through the states of PLATORM, HEAD, BODY, LEFT_ARM, RIGHT_ARM, LEFT_LEG, RIGHT_LEG, and HUNG. Use an ENUM to represent the game states listed. g. Use a linked list to…
- python: def character_gryffindor(character_list):"""Question 1You are given a list of characters in Harry Potter.Imagine you are Minerva McGonagall, and you need to pick the students from yourown house, which is Gryffindor, from the list.To do so ...- THIS MUST BE DONE IN ONE LINE- First, remove the duplicate names in the list provided- Then, remove the students that are not in Gryffindor- Finally, sort the list of students by their first name- Don't forget to return the resulting list of names!Args:character_list (list)Returns:list>>> character_gryffindor(["Scorpius Malfoy, Slytherin", "Harry Potter,Gryffindor", "Cedric Diggory, Hufflepuff", "Ronald Weasley, Gryffindor", "LunaLovegood, Ravenclaw"])['Harry Potter, Gryffindor', 'Ronald Weasley, Gryffindor']>>> character_gryffindor(["Hermione Granger, Gryffindor", "Hermione Granger,Gryffindor", "Cedric Diggory, Hufflepuff", "Sirius Black, Gryffindor", "JamesPotter, Gryffindor"])['Hermione Granger, Gryffindor', 'James…[Fish Tank] You play with a clown fish that has an initial size so. The fish can eat other fish in a tank organized in m columns and n rows. The fish at column i and row j has a positive size si,j. When your fish eats another fish, it grows by that amount. For example, if your clown fish has a size of 10 and eats a fish of size 5, it becomes of size 15. You cannot eat a fish that is bigger than your size. The game starts by eating any fish in the first (left-most) column that is not bigger than yours. After that, you advance one column at a time by moving right. You have only three allowed moves. You either stay at the same row, move one row higher or one row lower. You will always move to the right. Thus, you will make exactly m moves to advance from left to right. Your goal is to exit the fish tank from the right with the biggest possible size. The figure below shows an example with the best answer highlighted. In this case, the final fish size is 71 (10+8+7+24+22). You are required…Problem:Write a program that reads a list of integers from the keyboard and creates thefollowing information.a. Finds and prints the sum and the average of the integersb. Finds and prints the largest and the smallest integerc. Prints a Boolean (true or false) if some of them are less than 20d. Prints a Boolean (true or false) if all of them are between 10 and 90The input data consist of a list of integers with a sentinel. The program mustprompt the user to enter the integers, one by one, and enter the sentinel whenthe end of the list has been reached. The prompt should look like the following: Enter the numbers with <return>(99999 to stop):The output should be formatted as shown below: The number of integers is: xxxThe sum of the integers is: xxxxThe average of the integers is: xxx.xxThe smallest integer is: xxxThe largest integer is: xxxAt least one number was < 20: <true or false>All numbers were ( 10 <= n >= 90): <true or false>
- ii. Add a function named count_all() to this program that takes two parameters, a list of characters (e.g., x) and a character (e.g., y), in this order. This function must return the total number of times y appears in x. You must NOT use the built-in count() method to solve this problem.How many times does a for loop run? A. A for loop runs a random number of times. B. The value of the for loop variable defines the number of times a for loop may run. C. A for loop runs once. D. A for loop runs once for each item in the sequence included in the for statement. How do the lines of code in the body of a function get executed? A. As soon as the function is defined the code is executed B. The function must be called within the program C. The name of the function is passed in the exec command D. Based on the function's condition What happens when a function is called? A. The function is defined. B. The function is deleted. C. Program execution jumps to the function definition and executes the code in the function body. D. All of the above.Help with a lisp function (please post photos) A lisp function that generates a random day of the week, then displays a message saying that "Today is ... and tomorrow will be ...". For this purpose, create a global variable before the function containing the days of the week as a list. Then use the built-in function random first to generate a number between 0 and 6 (including). The expression (random) by itself generates a random integer. You can call it with one parameter to return a value within the range from 0 to the value of the parameter-1. For example, (random 10) will return a value between 0 and 9. Next, use the number generated at the previous step to retrieve the symbol for the day of the week from the list. Use the built-in elt function. We want the name of the day to appear capitalized. For this, extract the symbol-name of the day first, then apply the built-in function capitalize to it. Use the result in the princ function call, and do the same thing for the next day.…
- 3. A. write the set notation for the given regular expression: (a + (bb)*) 4. B. Write a regular expression for all String which have even no. of '1' (5Q2. A. write a code to find the number of students who pass CS course, when their marks>=40 . As the list has 85 students. ( list must show how many students passed/failed) use htmp or py B. wite a code to print this shape: * * * * * * * * * * C. Write a code to find the area and parameter of a Tringle; Area =1/2 * High * Base Parameter= S1+S2+ BaseFor each function call below, indicate if it is correct. If a function call is correct, show what is returned. If wrong, explain the mistake and correct it: (a) (list 'x 'y 'z) (b) (cons 'x 'y 'z)