Question 2: Write a java program that prompt the user for a string telephone number of the form ddd-dddd-dddd, where d is a digit. If the phone number is less than 11 digits, print on the screen "wrong number". Extract and print out the area code (the first 3 digits) then displays the phone number in the following format: (ddd) dd-dd- dddd.
Q: (1) Show the solution of following recurrence relation T(n) is O (nlogn) by using substitution metho...
A:
Q: What is ALE? Calculate ALE
A: ALE (annualized loss expectancy). In calculating risk, there are two general formulas that are used...
Q: Write a statement that increases numPeople by 5. Ex: If numPeople is initially 10, the output is: Th...
A: The answer is given below.
Q: If Problem A reduces to Circuit SAT in polynomial time, we can say A is in NP-Complete.
A: True
Q: 1. In the following operating systems architectures, discuss how servers that require direct access ...
A: А mоnоlithiс kernel is аn орerаting system аrсhiteсture where the entire орerаting syste...
Q: Which of the following is NOT true about emoticons
A: Emoticons are facial expressions that express a person's emotions, such as happiness, sadness, and f...
Q: In what format does a password manager store encrypted passwords? Is it local, online, clod, or usb?
A: Introduction: Passwords managers allow one to generate strong and unique passwords and store them in...
Q: of the following
A: given - Give details, and explain briefly on each of the following Core Practices: 1. Small Release...
Q: Write a C program to compute multiplication of two given interval [A] and [B] matrices by extending ...
A: here is the C program to compute the multiplication of two given interval matrices [A] and [B] by e...
Q: efer to Figure 2. Using Dijkstra’s Algorithm, determine the shortest distance from ertex S to other ...
A: Here in this question we have given a graph and we have asked to apply dijkastra algorithm on this g...
Q: 1. Draw a 16-QAM constellation diagram with two different peak amplitude values, 4 and 6, at four di...
A: The diagram of the 16_QAM is given below.
Q: Is it correct to say that stub isn't a network topology? explain
A: Introduction: A stub network, or pocket network, is a colloquial term that refers to a computer netw...
Q: 161/2 * 23 * 43/2 / 321/5 * 640 * 2-1
A: Answer is 64 Solution in step 2
Q: Write a console application that uses at least five(5) different methods of Math class. Provide a me...
A: In C#, Math class It is used present mathematics operation which contains static methods and constan...
Q: Convert the following NFA to an equivalent DFA
A:
Q: Write a c programming to find out maximum and minimum of some values using function which will retur...
A: Introduction: Function is basically a set of statements perform some computation and produces output...
Q: People find it easier to read time in hours, minutes, and seconds rather than just seconds. Write a ...
A: The number of seconds in an hour are 60 * 60 = 3600, the number of seconds in a minute are 60. These...
Q: Lael is constantly looking for students who are interested in running for office in student organisa...
A: Intro Lael is constantly looking for students who are interested in running for office in student or...
Q: Case Study 2: Jason is a project manager for his organization, and he’s been asked to lead an XP pro...
A: Jason is a project manager for his organization, and he’s been asked to lead an XP project. This pro...
Q: In javascript, what is the difference between a while loop and a for loop?
A: Introduction: The question is about In javascript, what is the difference between a while loop and a...
Q: Why do we take into account the worst-case scenario than an average-case scenario?
A: We are going to understand why we perfer using worst case scenario in algorithm rather than their av...
Q: Is it correct to say that stub isn't a network topology? explain?
A: Introduction: It is common to refer to a "stub network," or "pocket network," as a term for a comput...
Q: Consider the following multithreaded algorithm for performing pairwise multiplication on n-element a...
A: Algorithm: SUM-ARRAYS'(A, B, C) n = A. Length grain-size = ? // to be determined r = ...
Q: Give details, and explain briefly on each of the following Core Practices: 1. Pair Programming 2. C...
A: Pair programming is a coding practice in which two programmers work together on a single machine. On...
Q: Let M(n) be the minimum number of comparisons needed to sort an array A with exactly n elements. For...
A: Given: M(1)=0 M(2)=1 M(4)=4 Given expression: M(n)=2M(n/2)+n/2
Q: 1. Discuss the Cozy Bear incident of hacktivism. 2. please provide the references website 3.in-tex...
A: INTRODUCTION: Cozy Bear is a Russian hacker organization thought to be linked to one or more Russia...
Q: How do you fix common problems with a laptop touchpad? A laptop's display is blank. What could cause...
A: Introduction How do you fix common problems with a laptop touchpad? A laptop's display is blank. Wh...
Q: (s) of virtualization you will deploy (data, desktop, CPU, etc.) and why th
A: As we know Virtualization is the process of creating a virtual version of something like multiple op...
Q: Problem 4: Assuming that the numbers below are signed 2's complement numbers with the leftmost bit r...
A: In computers, we can only store numbers in fixed number of bits. An overflow occurs if the result we...
Q: Five typical networks' topologies must be identified. Which one do you think is the most trustworthy...
A: Given: Five typical networks' topologies must be identified. Which one do you think is the most trus...
Q: 2.16 LAB: Convert to seconds Write a program that reads in hours, minutes and seconds as input, and ...
A: For completing this program, we will follow the subsequent steps: Initializing the Scanner class As...
Q: How do you keep an office with shared resources like a printer secure?
A: Introduction: Shared resources are equipment that may be accessed by several remote computers that a...
Q: Prove the statement above. (Big-theta notation).
A: Not at all like Big-O notations, which addresses just upper bound of the running time for some algor...
Q: Create a fairly efficient method for each of the following issues and classify its efficiency. b....
A: Instructions: Initialize 50 state counters Count[] to zero. Traverse the given list of n student re...
Q: Use two buffer scheme and buffer size of 8 and 16 characters to scan the following code:
A: A specialized buffering techniques0 used to reduce the amount of overhead, which is required to proc...
Q: Given the Sailor, Boat, and Reservation tables. Sailor Table Reservation Table ID (PK) NAME RATING A...
A:
Q: 1- convert the following decimal numbers to 32-bit two's complement numbers а. +17, -17 b. +35,-35 с...
A: Note - Since you have posted a question with multiple sub-parts, we will solve first three subparts ...
Q: What influence does the blockchain have on "Systems Analysis and Design
A: Introduction: System Analysis and Design is assessing a company issue to improve it via the use of m...
Q: Write a program C++ to read a sequence of integers (n), then print the number of the positive and ne...
A: For this program, we will be performing the following actions: Asking user how many numbers he woul...
Q: What exactly is a communication protocol?
A: Introduction: Different network devices can interact with each other thanks to communication protoco...
Q: P4: 0 is an equivalence relation
A: Big theta is either the exact performance value of the algorithm, or a useful range between narrow u...
Q: What does it mean to have a gaming laptop computer?
A: Introduction: A gaming laptop is a small and portable computer that has a monitor.
Q: Which of the following sorting algorithms uses the divide-and-conquer programming paradigm? Select o...
A: The sorting algorithms are the bunch of steps used for sorting data to make it more meaningful.
Q: F H J M R S V 1 3 4 5 7 8. 9 10 11 12 low, middle, and high indices for each pass when using binary ...
A: Pass 1 Low : 0 Mid : 0+13/2 =6 High: 13 ----------------------------------- Pass 2 Low : 7 Mid : 7...
Q: write the research on the types of cloud services with the differences and pricing models
A: INTRODUCTION: In the given problem statement, we are asked to write all the cloud services with the ...
Q: hat exactly is clickstream analysis?
A: Introduction: The issue is based on data analysis of information gathered from websites.
Q: Given that x=2 and y=- 6, what is the output of this code If (x>1 && y<x-5) { If (x || y) x = ...
A: - We have to get the output of the provided code with explanation as to how we reach it.
Q: Explain the output of this program
A: In the given program, the Scanner class is initialized to read user input. Using Scanner's object, t...
Q: Why do we use Big-Oh in defining the time complexity of our algorithm and not Big-Theta or Big-Omega...
A: We are going to understand why we prefer using Big-oh notations rather than Big-theta or Big-omega n...
Q: In which cases you can transform an else-if statements to switch? Provide an example.
A: Please find the answer and detailed explanation in the following steps.
hey there i need this asap, Write code and also attach code running screenshot. Thanks.
Thumbs up will be gurrented
Step by step
Solved in 2 steps with 2 images
- Write a Java program correctly that generates a report of proof of vaccination against COVID-19 for the peoplewho received their dose of vaccination. Write a program which:1. Display a welcome message.2. Then prompts the user to enter the following:• First name, with first letter uppercase, which is then stores in a variable of type String.• Last name, with first letter uppercase which is then stores in a variable of type String.• Day of birth, set as a number between 1 and 31, which is then stores in a variable of typeint.• Month of birth, set as a number between 1 and 12, which is then stores in a variable of typeint.• Year of birth, set as a number between 1920 and 2006, which is then stores in a variable oftype int.• Day of vaccination, set as a number between 1 and 31, which is then stores in a variable oftype int.• Month of vaccination. set as a number between 1 and 12, which is then stores in a variableof type int.• Year of vaccination, set as a number between 2020 and 2021,…Write a java application for an Auto Car shop that shows a user a list of available services: oil change, tire rotation, battery check, or brake inspection. Allow the user to enter a string that corresponds to one of the options, and display the option and its price as €9, €7, €5, or €3, accordingly. Display an error message if the user enters an invalid item. ALSO SHOW OUTPUTWrite a Java application with (comments) for Car Care Shop that shows a user a list of available services: oil change, tire rotation, battery check, or brake inspection. Allow the user to enter a string that corresponds to one of the options, and display the option and its price as R250, R220, R150, or R50, accordingly. Display an error message if the user enters an invalid item.
- Java program:; User's name. Write a program that prompts for and reads the user's first and last name (separately). Then print a string composed of the first letter of the user's first name, followed by the first five characters of the user's last name, followed by a random number in the range 10 to 99. Assume that the name is at least five letters long. Similar algorithms are sometimes used to generate user names for new computer accounts. wwwWrite a java application for Limpopo’s Car Care Shop that shows a user a list of available services: oil change, tire rotation, battery check, or brake inspection. Allow the user to enter a string that corresponds to one of the options, and display the option and its price as R250, R220, R150, or R50, accordingly. Display an error message if the user enters an invalid item. ALSO SHOW OUTPUTProgram62.javaWrite a program that prompts for a full name (first and last) and assigns it to one string. The program then passes the full name to a void method as its sole parameter. The void method should print the first name, on one line, as many times as indicated by the length of the last name. Sample Output (image below)
- In Java, please write a program that asks the user to enter a string, and then converts that string to Morse code. Use hyphens for dashes and periods for dots. Morse Code Table Character Code Character Code Character Code Character Code space space 6 - . . . . G --. Q --.- comma --..-- 7 -- . . . H . . . . R .-. period .-.-.- 8 ---.. I .. S . . . question mark ..--.. 9 ----. J .--- T - 0 ----- A .- K -.- U ..- 1 .---- B - . . . L .-.. V . . . - 2 ..--- C -.-. M -- W .-- 3 . . . -- D -.. N -. X -..- 4 . . . .- E . O --- Y -.-- 5 . . . .. F ..-. P .--. Z --..Program41.javaWrite a program that prompts the user to enter a full name consisting of three names (first middle last) into one String variable. Then use methods of class String to: print the number of characters in the full name, excluding spaces print just the middle name and the number of characters in it. print the three initials of the name print the last name in all lower case. print the full name in the usual alphabetical format (Last, First Middle) and proper case. Program51.java Write a program that uses a while loop to generate 49 random integers, all from 20 to 49, inclusive. The same loop should print the integers in seven rows and right-aligned in columns seven characters wide. The program should report both the count and the total of integers in the 20s, 30s, and 40s. See Sample Output.Sample Output Program52.java Write a program that prompts the user for a binary number (from 3 to 8 bits) as a String and converts it to base-10 decimal value. There are several ways to…Program41.javaWrite a program that prompts the user to enter a full name consisting of three names (first middle last) into one String variable. Then use methods of class String to: print the number of characters in the full name, excluding spaces print just the middle name and the number of characters in it. print the three initials of the name print the last name in all lower case. print the full name in the usual alphabetical format (Last, First Middle) and proper case.
- Write a java application for Limpopo’s Car Care Shop that shows a user a list of available services: oil change, tire rotation, battery check, or brake inspection. Allow the user to enter a string that corresponds to one of the options, and display the option and its price as R250, R220, R150, or R50, accordingly. Display an error message if the user enters an invalid item.Homework: Homework01. Write a Java program that prompts the user to enter the seconds as a String (e.g., "1500500500"), converts the received value to long, and displays the number of years and days for the received seconds. For simplicity, assume a year has 365 days. Here is a sample run: Enter the number of seconds: 1500500500 '1500500500' seconds is approximately '4' years and '2766' daysWrite a Java application which prompts the user for enter a String, counts the number of vowels (a, e, i, o, u, A, E, I, O, U) contained in the string, and prints the counts. An example of execution is as follow: Enter a String: testing Number of vowels: 2 Hint: You could use toLowerCase() or toUpperCase() to convert the input String to lowercase or uppercase to reduce the number of cases.