The results from the mayor's race have been reported by each precinct as follows: P A B C D 1 192 48 206 37 2 147 90 312 21 3 186 12 121 38 Write a program to do the following: i. Display the table with appropriate headings for the rows and columns. ii. Compute and display the total number of votes received by each candidate and the percent of the total votes cast.
Q: Please provide a phrase that you may use to define the concept of "application security."
A: "Application security refers to the measures and techniques used to protect software applications…
Q: Should we use a "Employee Management System" similar to this or not?
A: Introduction: Employee management software empowers your workers to work hard every day to achieve…
Q: The Problems: Bad pointers, writing of the end of allocated memory, memory leaks. C++ gives you lots…
A: To protect your code from the problems of bad pointers, writing of the end of allocated memory, and…
Q: How should companies respond when they learn of vulnerabilities in their security systems?
A: How should companies respond when they learn of vulnerabilities in their security systems answer in…
Q: Operating systems employ five basic task management methods.
A: Answer: The operating system has five fundamental methods for managing tasks: The operating system's…
Q: What distinguishes software engineering from other technological fields?
A: Introduction: Software engineering is the study of software that teaches us about the procedures…
Q: How do you construct an operating system's microkernel? What's the main idea? What is the biggest…
A: Introduction: An operating system is a complex software system that manages computer hardware and…
Q: Using your own words, please explain what a challenge-and-response authentication system is. Why is…
A: Authentication procedures known as challenge-response are used in computer security to safeguard…
Q: Next semester, take computer programming. Picking the first language to learn might be difficult.…
A: Languages for Programming: A programming language creates a set of identical instructions.…
Q: Write a boolean expression that will be true if and only if the data type of interface. a variable x…
A: Boolean expression that will be true if and only if the data type of variable x implements the…
Q: What is software prototyping?
A: The process of creating a functional replica of a system or product that needs to be engineered is…
Q: Determine how well the different security methods handle the many security problem
A: Introduction: In today's digital age, security is of utmost importance to protect sensitive…
Q: Explain why a real-time operating system is essential in each of the three scenarios below and…
A: The importance of a real-time operating system (RTOS) in three different scenarios: industrial…
Q: Compare Ubuntu to other popular Linux variations. What makes your concept better?
A: That must be determined here. Ubuntu outperforms other popular Linux variants. Linux's most popular…
Q: Describe in great detail what you went through to get the required education and certifications.
A: Introduction: Education and certifications are essential for professional development and career…
Q: What exactly do you mean when you say "application security"? Give us a phrase that you can use to…
A: Security is very important to safeguard your system components. It helps in brand building and…
Q: Describe three (3) types of heuristics. Discuss the advantages and disadvantages of any two (2) of…
A: Heuristics are mental shortcuts or rules of thumb that people use to make decisions or solve…
Q: A switch is pressed every time a motor rotates. When the contacts come together, the switch…
A: The switch has no latched "on" state, similar to a switch on a calculator. During one of the motor's…
Q: Provide some background on the authentication challenge-response mechanism and how it works. If you…
A: Challenge-response authentication safeguards digital services and assets from unauthorized…
Q: What would happen if a company's cyber security was breached, and how severe would those…
A: Cybersecurity It seems to be the protection of information, disruption, disclosure, use, and…
Q: (Q1) Find the size of memory to store the shown image before and after down sampling by 2. Rows M…
A: The original image is 8 bit/pixel, which means each pixel requires 1 byte of memory. The size of the…
Q: A medium-sized business's confidential information protection strategy should include at least three…
A: Introduction: Confidential information is a crucial asset for any business, and it is essential to…
Q: Write a function testString (str) that takes a single string parameter str. The function must…
A: The HTML code that follows includes a JavaScript function named testString as well as a pop-up…
Q: In light of the COVID 19 virus outbreak, list the primary benefits and challenges that information…
A: The COVID-19 pandemic has disrupted Ghana's education sector and highlighted the need for a strong…
Q: Online crimes may have serious repercussions. First, investigate cybercrime, then design efficient…
A: Cybercrime is the use of a computer for illegal objectives, such as fraud, trafficking in child…
Q: To be acknowledged as someone who is able to "explain?" is to be known as someone who is capable of…
A: In this question we have to understand and discuss on - To be acknowledged as someone who is able…
Q: While developing a plan to ensure the safety of digital data, it is important to keep the following…
A: Introduction: To elaborate on how we may build a solid cyber security strategy, we must now discuss:…
Q: Decide which level has done the most physical and mental labor. Also emphasize.
A: Introduction : The amount of physical and mental labor required can vary greatly depending on the…
Q: What does a typical day look like for someone working in the cyber security field, and what are some…
A: What You Should Do: A cyber security instructor's tasks are: Develop study course material to meet…
Q: 14. Programming Short Questions (C++) b) Declare a function Max that takes an array B of floating…
A: Here's the algorithm for the max function in C++: 1. Begin the Max function, taking an array B of…
Q: It might be difficult to appreciate the value of privacy in the context of data protection
A: The answer is given in the below step
Q: Auditing and log gathering underpin cyber and network security. Define and illustrate the phrases'…
A: The term "auditing" refers to the methodical and impartial examination of data, operations, and…
Q: rite bash script to test for password strength: a) Write a script to check and validate passwords.…
A: Here is a possible implementation of the password strength checker script in bash: #!/bin/bash #…
Q: It is strongly suggested that the proposed solution be designed specifically for issues related to…
A: An Overview of Information Technology Security It is a collection of measures taken by an…
Q: The value of the expression (11+3*8) / 4% 3 is () O 31 0 01 02
A: Let's first have a look at the rules to solve the above given infix expression . While solving the…
Q: Access and Authentication subsystems of Information Security must be taken into account.
A: Information security The practice of preventing unauthorized access to information and information…
Q: Design a comparison circuit that compares two numbers, that is A(A1, A0) and B(B1, B0) with two bits…
A: The logic circuit has four inputs, A1, A0, B1, and B0, and one output F. F is HIGH (F=1) when A >…
Q: Doesn't this section require to briefly summarize the two operating system elements that everyone…
A: Operating System (OS): An operating system (OS) is software that manages and maintains computing…
Q: Bad pointers, writing past the limit of memory allotted, and memory leaks are the issues. When it…
A: Memory management in C++ involves allocating and deallocating memory manually. C++ supports dynamic…
Q: Name the three key components of the software engineering pr
A: Introduction: Software engineering can be considered as the phase of going through designing,…
Q: What happens if the processor requests a cache hit while flushing a block from the write buffer to…
A: A processor which can request a cache in order to quickly access frequently used data. When a…
Q: Risk to the operating system? Any more points?
A: A network operating system has been built expressly for use with network devices such as switches,…
Q: Analysts must present an executive summary and SWOT organization's strengths and weaknesses.…
A: Please find the answer below :
Q: This article discusses loT security, dangers, and societal impacts.
A: Introduction:-The internet of things (IoT) has grown so broad that the development of its security…
Q: Given two integers that represent the miles to drive forward and the miles to drive in reverse as…
A: The JAVA Code is given below wtih output screenshot
Q: This article defines real-time OSs with examples. Explain what makes this operating system unique.…
A: Operating systems that are created to offer predictable and deterministic temporal behaviour are…
Q: What does software development "lifecycle" mean?
A: Life Cycle of Software Engineering Discussion (SDLC). The Software Engineering Process Flow The…
Q: Describe Linux features in your own words. Thank you in advance for any more information on this…
A: Linux is a popular open-source OS. As an operating system, Linux takes applications from other…
Q: Is the industrial sector's microcontroller boom quantifiable?
A: A single-chip microcomputer created with VLSI technology is referred to as a microcontroller.…
Q: What happens if the processor requests a cache hit while flushing a block from the write buffer to…
A: If the processor requests a cache hit while flushing a block from the write buffer to main memory,…
1. The results from the mayor's race have been reported by each precinct as follows:
P A B C D
1 192 48 206 37
2 147 90 312 21
3 186 12 121 38
Write a
i. Display the table with appropriate headings for the rows and columns.
ii. Compute and display the total number of votes received by each candidate and
the percent of the total votes cast.
2. Write a program in C++ to display the sum of the series [ 9 + 99 + 999 + 9999 ...].
Test Data :
Input the number or terms:5
Expected Output :
9 99 999 9999 99999
The sum of the series = 111105
3. Write a program in C++ to find the sum of the series 1 +11 + 111 + 1111 + .. n terms.
Test Data :
Input the number of terms : 5
Expected Output :
1 + 11 + 111 + 1111 + 11111
The Sum is : 12345
4. Write a C program to create a new array after replacing all the values 5 with 0 shifting all
zeros to right direction.
Expected Output:
Elements in original array are: 1, 2, 0, 3, 5, 7, 0, 9, 11, 5
Elements in new array are: 1, 2, 0, 3, 7, 0, 9, 11, 0,
Step by step
Solved in 3 steps with 3 images
- (Numerical) Using the srand() and rand() C++ library functions, fill an array of 1000 floating-point numbers with random numbers that have been scaled to the range 1 to 100. Then determine and display the number of random numbers having values between 1 and 50 and the number having values greater than 50. What do you expect the output counts to be?(Statistical) In many statistical analysis programs, data values considerably outside the range of the majority of values are simply dropped from consideration. Using this information, write a C++ program that accepts up to 10 floating-point values from a user and determines and displays the average and standard deviation of the input values. All values more than four standard deviations away from the computed average are to be displayed and dropped from any further calculation, and a new average and standard deviation should be computed and displayed.PYTHON (Uee While Loop) only Write a python program that calculates the populations of foxes and rabbits who live within a certain area of land, as that number changes from year to year. It will take the initial populations as inputs, and then proceed to calculate the year-by-year changes. The following is derived from the “Lotka-Volterra equations”, which you may look up if you desire. Essentially, we will model the foxes and rabbits with 4 constants, and 2 data structures of year-by-year values. They are defined as follows: r[y] # of rabbits in year y f[y] # of foxes in year y α or alpha - birth rate of rabbits β or beta - death rate of rabbits, dependent on # of foxes γ or gamma - birth rate of foxes, dependent on # of rabbits δ or delta - death rate of foxes, caused naturally The formulas we will use are: r[y]=r[y−1]+(r[y−1]×α)−(r[y−1]×f[y−1]×β)r[y]=r[y−1]+(r[y−1]×α)−(r[y−1]×f[y−1]×β) f[y]=f[y−1]+(f[y−1]×r[y−1]×γ)−(f[y−1]×δ)f[y]=f[y−1]+(f[y−1]×r[y−1]×γ)−(f[y−1]×δ) However,…
- Objectives: In program C. NOT C++ or python • How to use the random number generation. • How to call function and return data to the main function. • How to print in a tabular form. Write a program that simulate coin tossing. • For each toss of the coin the program should either prints Heads or Tails. • Let the program toss the coin 100 times, and count the number of times each side of the coin appears. • The program should call a separate function called “flip”, that takes no argument and returns 0 for tails and 1 for heads using random generator. • The program should print the result received either “Heads”, or “Tails”. • The print should be in tabular form 10 in a row on one line after another, see figure below. -The result should be completely random. In other words, the number of heads and tails should be different each time you run the programUniversity of Babylon College of Information Technology Department of Information Security Programing Fundamentals C++, First Stage Assignment (2) / Due Date March 1,2021: 12pm Q1. Write a program to read one mark of a student from keyboard and check whether the student is pass or fail, then print "pass" if the mark is greater than or equal to 50 and print "fail" if the mark is less than 50. Q2. Write a program to read three numbers from keyboard and find out the maximum out of these three numbers (using nested if-else). Q3. Write a program to read marks from keyboard display equivalent grade cording to the following table. (using if-else if leader). Iyour program should Grade Distinction Marks 100 - 80 60 - 79 First Class 35 - 59 Second Class 0- 34 Fail Q4. Write a program to read a number in the range from 1 to 7 and accordingly it should display MONDAY to SUNDAY (using if-else-if leader). Q5. Write a program to read number for keyboard and check whether the given number is positive,…C++ A company hired 10 temporary workers who are paid hourly and you are given a data file that contains the last name of the employees, the number of hours each employee worked in a week, and the hourly pay rate of each employee. You are asked to write a program that computes each employee’s weekly pay and the average salary of all employees. The program then outputs the weekly pay of each employee, the average weekly pay, and the names of all the employees whose pay is greater than or equal to the average pay. If the number of hours worked in a week is more than 40, then the pay rate for the hours over 40 is 1.5 times the regular hourly rate. Use two parallel arrays: a one-dimensional array to store the names of all the employees (Name) a two-dimensional array of 10 rows and 3 columns to store the number of hours an employee worked in a week (Hrs Worked), the hourly pay rate (Pay Rate), and the weekly pay (Salary). Your program must contain at least the following functions: a…
- Create a C++ program for the following cases:Required:1. Program Plan2. Algorithm 3. Flowchart4. Pseudocode5. Iteration Table6. Sample Run Write a C++ program to check whether the sequence of the numbers in a given array is a "Arithmetic" or "Geometric" sequence. Return the message “Not Arithmetic nor Geometric” if the sequence is not "Arithmetic" or "Geometric". Sample Output Enter a sequence = 1, 3, 5, 7 The sequence is ArithmeticC++ A company hired 10 temporary workers who are paid hourly and you are given a data file that contains the last name of the employees, the number of hours each employee worked in a week, and the hourly pay rate of each employee. You are asked to write a program that computes each employ- ee’s weekly pay and the average salary of all the workers. The program then outputs the weekly pay of each employee, the average weekly pay, and the names of all the employees whose pay is greater than or equal to the average pay. If the number of hours worked in a week is more than 40, then the pay rate for the hours over 40 is 1.5 times the regular hourly rate. Use two parallel arrays: a one-dimensional array to store the names of all the employees, and a two-dimensional array of 10 rows and 3 columns to store the number of hours an employee worked in a week, the hourly pay rate, and the weekly pay. Your program must contain at least the follow- ing functions—a function to read the data from…C++ A company hired 10 temporary workers who are paid hourly and you are given a data file that contains the last name of the employees, the number of hours each employee worked in a week, and the hourly pay rate of each employee. You are asked to write a program that computes each employee's weekly pay and the average salary of all the workers. The program then outputs the weekly pay of each employee, the average weekly pay, and the names of all the employees whose pay is greater than or equal to the average pay. If the number of hours worked in a week is more than 40 hours, then the pay rate for the hours over 40 is 1.5 times the regular hourly rate. Use two parallel arrays: a one-dimensional array to store the names of all the employees, and a two-dimensional array of 10 rows and 3 columns to store the number of hours an employee worked in a week, the hourly pay rate, and the weekly pay. Your program must contain at least the following functions—a function to read the data from the…
- I want answer in C Language Research our planet population growing issues online. Get approximations for the current population and its growing rate (the percentage by which it’s likely to increase this year). Write a program that calculates a) World population growtheach year for the next 25 years, using the supposition that the current growth rate will remain unchanged. b) Print the results in a table. The first column should display the year from year 1 to yearThe second column should display the anticipated world population at the end of that year.The third column should display the numerical increase in the world population that would occurthat year.i).The results from the mayor's race have been reported by each precinct as follows:Candidate Candidate Candidate CandidatePrecinct A B C D1 192 48 206 372 147 90 312 213 186 12 121 38Write a program to do the following: i. Display the table with appropriate headings for the rows and columns.ii. Compute and display the total number of votes received by each candidate andthe percent of the total votes cast. ii). Write a program in C to make such a pattern like a pyramid with numbers increased by 1.12 34 5 67 8 9 10c++ A palindrome is a word or a phrase that is the same when read both forward and backward. Examples are: "bob," "sees," or "never odd or even" (ignoring spaces). Write a program whose input is a word or phrase, and outputs whether the input is a palindrome. If the input is bob, the output is: bob is a palindrome If the input is bobby, the output is: bobby is not a palindrome Hint: Start by just handling single-word input, and submit for grading. Once passing one single-word test cases, extend the program to handle phrases. If the input is a phrase, remove or ignore spaces. 356110.1926120.qx3zqy7