Q2: (A) Grades are to be assigned to students as follows: A 80%-100% B 65% -79% C 50% -64%. Write a script file to prompt the user to input a mark and display the appropriate grade. If the user enters a number greater than 100 or less than zero, display a message that the mark is invalid. (File name "testMark").
Q: write a program to find prime and composite.
A: #include <iostream>using namespace std; int main(){ int n; cout<<"Enter range to…
Q: In many ways, it appears that notebook computers and mobile devices are significantly different from…
A: Introduction; The most obvious distinction between a mobile phone and a personal computer is their…
Q: In terms of SoS interface design, how useful is a unified user interface? What are the aspects that…
A: Answer:
Q: How does the "shared responsibility" paradigm for cloud security function in terms of security
A: A shared responsibility model is a cloud security architecture that spells out a cloud computing…
Q: The range of frequencies available for data transmission is known as A. Baud B. Bandwidth C.…
A: Answer: Bandwidth is the distinction between the upper and lower frequencies in a persistent band of…
Q: Take a look at how Ubuntu stacks up against other widely used distributions of Linux and see how it…
A: Given: Here, we must know. Ubuntu tops other Linux distributions. Linux's most popular distribution…
Q: There are two types of database architectures: relational and object-oriented.
A: Object databases are capable of managing a variety of data formats, in contrast to relational…
Q: Make sure you know the difference between random access memory (RAM) and dynamic random access…
A: Answer:
Q: What is the approximate loss per km for 850 multimode fiber? O.19 dB/km O.34 dB/km O2.0 dB/km O 1.1…
A: AS PER GUIDELINE I CANNOT ANSWER ALL Question - 13 Multimode fiber is used for short distances and…
Q: When employing an object-oriented design approach, everything is conceptualised in terms of the…
A: Object Oriented Design In an object oriented design, we create a paradigm that is object centric,…
Q: Consider the following representation of a queue ADT that is implemented using an array data…
A: #include <iostream>using namespace std;//implementing queue class using arraytemplate…
Q: What characteristics set software engineering apart from other subfields of engineering as a…
A: Software engineering: Software engineering involves breaking down customer requirements and…
Q: Can you use DFS to assess if two graphs are related? If you can find it, step-by-step instructions…
A: Given: Using DFS, can you identify if a graph is related? If you can discover it, explain it step…
Q: Finsider risks to cloud security have a variety of effects and solutions.
A: Given: In order to support online security and transfer from inheritance to current information…
Q: What exactly does it mean to be computer literate, and how can you demonstrate this knowledge?
A: It is the fundamental right of person to be trained in computer skills to apply technology in their…
Q: 1. Write the appropriate or instruction to reset bits 5 and 7 of register AX, and keep all…
A: there are several ways you can solve 1 AX is the register with both AH and AL so reset 5th and 7th…
Q: It is usual practise to link the entry of 0.0.0.0/0 in the routing table of a host with the Gateway…
A: Introduction: The routing table is used to route data packets to their final destination. The…
Q: Explain what the term "Flow of Compilation and Execution" means.
A: Streamlined collection: A particular programming language is used by software engineers to create…
Q: re the statements P → (Q ∨ R) and (P → Q)⋁(P → R) logically equivalent? Create a truth table.
A: Truth table for the statements is given below
Q: A significant number of the field of software engineering's fundamental ideas have been disregarded.…
A: Let's start out with a high-level overview of the software development process: Software and…
Q: Investigate the function that wireless networks now serve in poor countries. In certain locations,…
A: Introduction: Wireless LANs' appeal stems mostly from their convenience, low cost, and ease of…
Q: Consider the following instance of relation Sells(book_title, library, price): Sells book_title…
A: Answer:- iii. b) SELECT distinct library from sells WHERE library not in (select library from sells…
Q: How does a data breach in the cloud influence cloud security?" Is there a wide range of possible…
A: Data breach in Cloud A data breach occurs when secure/confidential information is intentionally or…
Q: Research should be done to determine the importance of wireless networks in emerging countries. Why…
A: Radio technology: Radio technology is utilised in mobile phones, broadcast radio and TV, WLAN, GNSS,…
Q: 4. Consider the following C program segment. Rewrite it using no gotos or breaks. = -3; for (i = 0;…
A: To do: Rewrite the above program without using break or goto statements. The switch statement can…
Q: Think about the benefits that wireless networks provide to countries that are still developing…
A: Users of mobile phones with access to wireless networks are able to obtain real-time data even as…
Q: Examine the system's development, paying specific attention to significant persons and events.
A: Definition: Discuss the development of information systems, concentrating on the key persons and…
Q: It is not feasible to construct a mobile network of any kind without using wireless technology in…
A: RF technology, which operates wireless networks, is a frequency within the electromagnetic spectrum…
Q: Perform research on cloud computing and social media blogging.
A: Answer: Social networks are rapidly fulfilling a range of extra activities on the cloud, in addition…
Q: The Internet Protocol (IP) address of a computer is its unique identity on the Internet. How do…
A: Solution: To talk about IP addresses and mnemonic addresses, go to: Determine the greatest number of…
Q: How challenging or simple is it to add new users to or delete existing ones from the operating…
A: We must identify the problems in adding and deleting users from the Windows 10 and Linux operating…
Q: Concurrent computing is used to update a bank account with debit and credit transactions, and it is…
A: Currency control specifies several businesses which may be carried out at a same moment, followed by…
Q: Create a C++ program of Order Menu with billing system like in the bellow pic. Add a system cancel…
A: Please refer to the following steps for the complete solution to the problem above.
Q: waterfall model of the software development life cycle (SDLC), what are the stages? Where did Barry…
A: Answer:
Q: What will the following Code segment print on the screen?
A: The output of the above java program will be :
Q: It was your job to create an interactive, integrated system for the University of Technology and…
A: Given: Cologne University of Applied Sciences designed a Master's degree in Automation and IT…
Q: Give one example for each type of associations in the domain of class diagram. Show your answers on…
A: Class diagram is a static diagram which represents the static view of an application. It contains…
Q: What precisely is meant by the term "file protection," and how is this particular facet of the Linux…
A: Linux: Linux was created on a MINIX computer at first. The Linux file system was based on the MINIX…
Q: Explain what the term "Flow of Compilation and Execution" means.
A: Compilation flowchart: The source programme is written by software engineers in a particular…
Q: A characteristic of a control, similar to the properties of other controls, may alter how the…
A: Given: The attribute control charts are a series of control charts that were created particularly…
Q: Is it possible for an attacker employing a MAC to modify the Tag and the ciphertext in transit? This…
A: The tag stands for "message authentication code," which is a piece of data sent back and forth…
Q: Install Linux on a personal computer, and then go through a series of instructions that are often…
A: Given: To demonstrate how to install the Linux operating system and go through some of the most…
Q: A discussion is offered on how formative assessment may be utilised to answer user issues and…
A: It refers to the quality of a user's interaction with objects or systems such as websites, software,…
Q: The impact of a data leak on cloud security is still up for debate. There are a number of…
A: Data leakage from the cloud: Data infringement occurs when secure/confidential information is…
Q: It is important to investigate the function of wireless networks in the rapidly developing countries…
A: Introduction: Thanks to wireless networks, mobile clients may access real-time data while moving…
Q: The tiny screens of smartphones, phablets, and tablets are changing the way user interfaces are…
A: Emerging technologies often enter the era of rapid change as the developers of new systems seek to…
Q: What are the three most important things that need to be in place for a network to run effectively…
A: Introduction: This question clarifies the difference between network architecture and application…
Q: still unclear if a data leak affects cloud security or not. Examples of possible countermeasures…
A: Please find the answer below :
Q: Would we investigate cyberstalking in the same manner as identity theft? Why or why not?
A: In the United States, cyberstalking is defined as using the internet and other technologies to…
Q: Do data breaches affect cloud security negatively? The following are some possible countermeasures.
A: SOLUTION: Breach of data in the cloud The purposeful or inadvertent leaking of secure/confidential…
Step by step
Solved in 2 steps with 1 images
- Character Analysis Create a source code text file and save it as named text.txt. Write a program that reads the file's contents and determines the following: - The number of uppercase letters in the file. - The number of lowercase letters in the file. - The number of digits in the file. - The number of whitespace characters in the file. * Note: Please be sure to use the Python program when creating the program. Thanks!print ("sum of all values entered correctly = %.2f" % total) Slide Type Slide • Exercise # 3 Write a program that reads each line in a file, reverses its lines, and writes them to another file. For example, if the file input.txt contains the lines: Slide Type Fragment v Mary had a little lamb Its fleece was white as snow And everywhere that Mary went The lamb was sure to go. • You may assume that the input file is called inputex3.txt and the output file is outputex3.txt. Slide Type Fragment v • then output txt contains The lamb was sure to go. And everywhere that Mary went Its fleece was white as snow Mary had a little lamb In [6]: Slide Type W Exercise# 3 - Source Code JBL PrtSc Sys Rq Insert Scrlk Home Pa F4 F5 F6 F7 F8 F9 F10 F11 F12 Delete & Backspace 4 7 V 8 Y U Ох P : く 40 F G Y J K L / Enter 146 / V B ý Ni M Shift V •1 このShould not be case sensitive when getting the column name. Use python language for a program that modifies and sorts the content of a specific csv file based on the inputted column name. The program should ask Enter filename: Enter column name to be sorted: Additionally, the csv file must be modified and no additional csv files must be created. The application will catch and display an error message "the file does not exist" if the csv file does not exist.
- Python please: Given a text file named RandomTextFile.txt that contains newline characters, write a program that removes all the newline characters from the file. Your program should use the filename as input, and the output file should use the same filename as the original. Use the attached file RandomTextFile.txt to help you write and test your program. It contains the following text: Python is an interpreted language and the python interpreter is a computer program that executes code written in the python programming language. The python interactive interpreter is useful for simple operations or programs consisting of only a few lines. For more lines, a programmer can write Python code in a file, and then provide that file to the interpreter. For normal development a programmer installs python as an application on a local computer. Macintosh and Linux operating systems usually include python, while Windows does not. Programmers can download the latest version of python for free from…Slide Type Slide • Exercise # 4 A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: • The name of the client, the service sold (such as Dinner, Conference, Lodging, and so on), • The amount of the sale, and the date of that event. • Write a program that reads such a file and displays the total amount for each service category. Display an error if the file does not exit or the format of the record is incorrect. No need to display anything else in this regard. Note that you can assume that the dates are entered correctly (no need to validate them). You may also assume that the name of the input text file is inputex4.txt. • Make sure you use a dictionary in your solution. • Sample run is included below for the given input file inputex4.txt Summary of total sales according to services Dinner 634.75 Conference 1133.25 Lodging Dinner and Lodging 550.25 625.14 Slide Tyne Fragment vQuestion 4: Quote Filename: quote.py Write a program that reads in an integer representing the number of sentences in the quote. For each sentence in the quote, the program should prompt for the length of the sentence and then read in that number of words from the keyboard. At the end of each sentence add a period ("") and go to the next line. After all of the words in the quote are read, then print the quote to the screen. For example: Number of sentences: 4 Enter length: 3 Roses are red. > Violets are blue. > There is no try. > Just do not or do.
- Q1: Write a program to calculate the average of four integer score, and find the grade for 7 students. The program should do the following: 1. Read the first, second name and the four score of the 7 student from the file (E:\\exam.txt), 2. Calculate the average and find the grade of the average by using the if and if else. 3. Save the first, second name, average and the grade for each student in file (E:\\grade.txt). (10 columns for the first and second name. 4 columns, precision 2, for the average and grade)Task: Loading data from files This exercise will require you to load some information from files and use it in your program. scene.txt contains a description of a series of shapes and colours to draw. You need to write code to read in the file data and draw the requested shapes in the correct colour. Each line in scene.txt will contain one of the following starting keywords followed by some data: COLOUR followed by 3 values: R, G, B CIRCLE followed by 3 values: X, Y, RADIUS RECT Followed by 4 values: X, Y, W, H LINE Followed by 4 values: X1, Y1, X2, Y2 CIRCLES are defined from the center. RECT's are defined from the top left. All values are space separated, and you can assume all input is correct (no errors). Please solve this program to draw the scene. I can't upload the file scene.txt, so I decide to screenshot a file for you. Subject: Java ProgrammingWrite code that does the following: opens a file named MyName.txt, reads the first linefrom the file and displays it, and then closes the file.
- The function fopen return NULL when: An error occurred while opening the file. An error occurred while reading the file. An error occurred while closing the file. An error occurred while compiling the file.• Use a while loop • Use multiple loop controlling conditions • Use a boolean method • Use the increment operator • Extra credit: Reuse earlier code and call two methods from main Details: This assignment will be completed using the Eclipse IDE. Cut and paste your code from Eclipse into the Assignment text window. This is another password program. In this case, your code is simply going to ask for a username and password, and then check the input against four users. The program will give the user three tries to input the correct username-password combination. There will be four acceptable user-password combinations: • alpha-alpha1 • beta-beta1 • gamma-gamma1 • delta - delta1 If the user types in one of the correct username-password combinations, then the program will output: "Login successful." Here are a couple of example runs (but your code needs to work for all four user-password combinations): Username: beta Type your current password: beta1 Login successful. Username: delta Type…Q1\Write a program that sums the numbers between 1 and 9 and finds the sum total 1. Add file Q2\Write a program using MATLAB to enter the grades of the first semester with an assessment for each grade and does the grade represent a pass or a failure 1. Add file