Write a Powershell script program (evenodd) which adds the odd numbers in odd lines and adds the even numbers in even lines. Write the result on the standard output! In each lines there are at least 2 numbers. The filename is given by a parameter.
Q: Apex Assignment: Create a apex class called addition and then create a method to add the 2 integer…
A: Apex is a program language which is used to create the salesforce Backend and mostly Salesforce…
Q: Write a program that plays a guessing game with the user. The program should generate a random…
A: Required code for the Java program is given in the next step using a while loop for continuous…
Q: What measures should be followed to assure the stability and availability of a local area network?
A: Your answer is given below. Introduction :- A local area network (LAN) in computing is a…
Q: -Problem -2 When you execute your program it should ask user to input any number then check if the…
A: Note: Programming language is not mentioned, so writing code in C++ In this question, we are asked…
Q: Given the PDA below determine whether the following string is accepted or not, write A if accepted…
A: 1) abba => NA(Not-accepted) , It would not be accepted by PDA 2) ε => NA, there is no direct…
Q: List out the benefits of biometric authentication?
A: Biometric authentication means, it is a security process, that will depend on unique biological…
Q: Identify at least three of the most recent routing methods. Instead than describing the algorithm,…
A: Routing algorithms with the most popularity: Algorithm of Distance-Vectors.Algorithm of…
Q: Write a Java program using Thread with single Server and Multiple Clients NOTE: Client must be…
A: Your java program is given below as you required.
Q: Question 7: Prove the non-regularity of the given language L using pumping lemma. L={a"b?na2n}
A: Pumping lemma: Pumping lemma is used to prove non regularity of the language. The regular language…
Q: Given a coding scheme. a:000 e:001 i:01 k:1100 0:1101 p:11110 u:11111 (i) (ii) Draw a tree to…
A: Tree to represent coding scheme:
Q: Theft of one's identity is a regular and growing kind of cybercrime. How may identity fraudsters…
A: Answer: Whether an identity cheat hears you perusing out your credit card number on the telephone,…
Q: ntify the control system areas of the BMS (Battery Managem
A: Lets see the solution.
Q: I would like to ask something. What may happen to customer if you didn't follow the 8 Laws of…
A: The 8 laws of software evolution are applicable to only e-type of software i.e. the software which…
Q: What do you mean by Rate Limiting?
A: Rate Limiting: Rate limiting is the concepts of computer networking which is used to direct rate of…
Q: pgraded
A: Solution - In the given question, we have to find the correct option among the given options.
Q: Knowing which programming paradigms a language supports is of what importance? Explain more?
A: Knowing which programming paradigms are supported by a programming language might help you decide…
Q: What separates cybercrime from other crimes? Please provide examples from the literature.
A: Definition: We recently ruled out online crime as a factor in the decrease in international crime…
Q: To what end and how does synchronous time-division multiplexing error and flow control function?
A: Answer : The physical layer of the OSi model is the medium and hardware infrastructure of the…
Q: Create a program that creates and runs 3 threads A, B, C and displays the string “Thread complete”…
A: C Code: #include <pthread.h>#include <stdio.h>#include <unistd.h>#include…
Q: Do you know what the most current network security measures are? Provide an explanation for each of…
A: Network security : It is highly recommended that every organisation install protection for local…
Q: What distinguishes a hacktivist from a cyberterrorist in your opinion? Is using hacktivists against…
A: Let's take a closer look at the solution. Hacktivism is the peaceful use of unlawful or legally…
Q: Furthermore, the context in which object-oriented analysis and design is used is advantageous; for…
A: Object-oriented analysis and design (OOAD) is a technical approach that uses the Object Oriented…
Q: What are the advantages and disadvantages of IPSec, as compared to alternative network security…
A: IPsec Internet protocol security is a secure network protocol that are used to encrypt the data…
Q: Compare and Contrast technical similarities and differences between TinyC, C and C++ Compilers
A:
Q: What is the connection between firewalls and traffic analysis and alert?
A: - We must discuss the link between Traffic Analysis and Traffic Alert, as well as firewalls. -…
Q: How will the Internet of Things (loT) affect us? Give an example of a smart device or app.
A: According to the information given:- We have to define the Internet of Things (loT) affect us with…
Q: How are computer systems put together? Explain?
A: system of computers 1) A computer system is a set of hardware and software that is used to receive,…
Q: Explain what application metadata is and provide examples of what it may be used for. In the realm…
A: Metadata: There are many methods to define metadata: Data that offer context for other data.…
Q: Discussion on network and cyber security breaches as well as methods to prevent them is encouraged.
A: Explanation: A range of network and cyber security breaches should be known to everyone. Types of…
Q: What does a virtual machine (VM) stand for? What is the benefit of using a virtual machine? What are…
A: A virtual machine (VM) provides a distinct environment for executing its OS and applications…
Q: If object-oriented programming and abstract data types must be implemented together or whether they…
A: The computer language Object-Oriented Programming (OOP) focuses on objects rather than actions. The…
Q: Compressed Post Office Protocol (CPOS) is a computer protocol in compressed form.
A: Explanation: The Post Office Protocol (POP) is a network protocol that enables a user client…
Q: Which network designs exist?
A: According to the given information: We must provide some examples of network architectures.
Q: What are the many types of computer languages that we may use? What can you say about each of them…
A: Given: Please Like and Upvote.It is one of numerous languages used to construct a set of particular…
Q: ement system (DBMS) serves what purpose?
A: Design & Description: 1- Please check the following design of the database management components…
Q: In order to get a digital certificate for a single public key, how do you keep the private key…
A: The fact that RSA is a trapdoor permutation means that you are not required to reveal the private…
Q: 1. The causal sequence x(n) in z- transform means the limited of summation taken from n= -o0 to n= 0…
A: Answer : False In case of causal sequence x(n) in z - transform limited of summation taken from n=0…
Q: onsider the NFA shown in Figure 2.b and convert it to a DFA. Ensure you your working out…
A: To make DFA from NFA we use a method called as Subset construction method. When a Finite Automata…
Q: What is a Cloud Technology?
A: Users can access storage, data, software, and servers over the cloud using any internet-connected…
Q: Explain why peripherals are not connected directly to the system bus?
A: Note : As per our guidelines we are supposed to answer only one question. Kindly repost other…
Q: 21. In the following code (number added), which will be the last line executés successi (1) astr -…
A: Correct Answer is a 1. After this second line will throw an error. Let us understand why
Q: What measures should be followed to assure the stability and availability of a local area network?
A:
Q: Computer architecture and computer organisation are two distinct concepts in the field of computing.
A: Computer architecture: Computer architecture and organization are two popular concepts used when…
Q: Identify the factors that contribute to transmission delay.
A: Introduction: Factors that influence transmission delay are listed below. Translational solution:…
Q: Change this MIPS code to RISC-V Assembly using sll. Please add comments. Allow running in RARS.
A: MIPS to RISC-v assembly using Shift Right logical. The shift right logical instructions in RISC-v is…
Q: What is the difference between object-oriented programming and procedural programming, and how can…
A: Introduction: Programming is a creative process carried out by programmers to instruct a computer…
Q: Explain the workings of a computer system, including its components.
A: Central Processing Unit The computer does its primary work in a part of the machine we cannot see, a…
Q: 1)what is the degree of vertex v5 2)how many paths of length 3 are between vertex v1 and v3 3)does…
A: Here in this question we have given a graph in matrix form.and from that graph we have asked to find…
Q: Explain the benefits and drawbacks of nested classes in OOP (OOP).
A: Nested classes have an advantage in OOPs. A class declaration may be nested within the definition of…
Q: Are there any downsides to using multiple authentication methods? So what exactly does it do to help…
A: 2FA: It is a security measure that requires more than one security factor for account logins and…
Write a Powershell script program (evenodd) which adds the odd numbers in odd lines and adds the even numbers in even lines. Write the result on the standard output! In each lines there are at least 2 numbers. The filename is given by a parameter.
Trending now
This is a popular solution!
Step by step
Solved in 3 steps
On Powershell language please. Not shell script can you guys even read? I asked this question like 3 times specifying that it has to be done on POWERSHELL. But i always get it in linux shell script. Is there any way i get my question refunded? Cause this isnt what i asked for at all. Thank you.
- Write a program that prompts the user for an input file name, reads all words from the input file, and writes the words to the output file sentences.txt. Start a new line whenever a word ends in a period, question mark, or exclamation mark. Also do this if the period, question mark, or exclamation mark is followed by a quotation mark. Otherwise, separate words with spaces. main.cpp in1.txt in2.txt 1 #include 2 #include 3 #include 4 using namespace std; 5 6 int main() 7 { 8 9 10 11 12 13 14 15 } string input file_name; cout > input file_name; /* Your code goes here */ return 0; << endl;Write a program that prompts the user to enter afile name and displays the occurrences of each letter in the file. Letters are caseinsensitive. Here is a sample run:Enter a filename: Lincoln.txt ↵EnterNumber of As: 56Number of Bs: 134...Number of Zs: 9Write a program that reads student's IDs and exam scores (type int) for a particular exam in a course from each line of an input file (the input file is included). You need to compute the average of these scores and assign grades to each student according to the following regulation: If a student's score is within 10 points (above or below) of the average, assign a grade of satisfactory. If a student's score is more than 10 points above average, the grade will be outstanding. If a student's score is more than 10 points below the average, the grade will be unsatisfactory. The output of your program should consist of a three-column table that shows each ID, score, and corresponding grade. A sample output is shown below. ID 0 ONM45676 0 1 8 9 Score 75 99 66 43 87 65 82 91 84 76 Grade Satisfactory Outstanding Unsatisfactory Unsatisfactory Outstanding Unsatisfactory Satisfactory Outstanding Satisfactory Satisfactory
- Write a program that will sequentially list numbers from 0 to 50, changing its color depending on the size of the number, for example, for numbers from 0 to 10 it will be green, 11 to 22 red and 23 to 35 blue, etc. Limit the screen output speed to about 1 character / second. In order to change colors, you must first use the GetStdHandle function to get a handle to the console, which is similar to getting a file pointer before working with a file. It is done e.g. as follows: HANDLE hConsole; hConsole = GetStdHandle (STD_OUTPUT_HANDLE); The above functions are defined in windows.h Tip 2: Write a utility to find out the colors corresponding to all combinations from 0 to 255. Tip 3: Instructions and sample program for working with time. C language plz with explanation of codes. thanksWrite a program that inputs a filename from the user and prints to the terminal a report of the wages paid to the employees for the given period. The report should be in tabular format with the appropriate header. Each line should contain an employee’s name, the hours worked, and the wages paid for that period. The wages paid are equal to the hourly wage * hours worked + tips. Use the sample data using python: Berg 7.25 32 110.75 Turner 8.00 40 0 Roman 10.0 50 0 Pugh 7.25 32 22.75 Potter 8.75 20 0 Savage 9.50 40 55.0Write a program that prompts the user for an input file name, reads all words from the input file, and writes the words to the output file sentences.txt. Start a new line whenever a word ends in a period, question mark, or exclamation mark. Also do this if the period, question mark, or exclamation mark is followed by a quotation mark. Otherwise, separate words with spaces. Complete the following file: sentences.cpp 1 #include #include 3 #include 4 using namespace std; 6. int main() 7 { cout > input_file_name; 8 « endl; 9. 10 11 12 13 14 return 0; 15 } Submit
- Write a program that reads student's IDs and exam scores (type int) for a particular exam in a course from each line of an input file (the input file is included). You need to compute the average of these scores and assign grades to each student according to the following regulation: If a student's score is within 10 points (above or below) of the average, assign a grade of satisfactory. If a student's score is more than 10 points above average, the grade will be outstanding. If a student's score is more than 10 points below the average, the grade will be unsatisfactory. The output of your program should consist of a three-column table that shows each ID, score, and corresponding grade. A sample output is shown below. ID SOLS SENTO 0 1 2 3 4 8 9 Score 75 99 66 43 87 65 82 91 84 76 Grade Satisfactory Outstanding Unsatisfactory Unsatisfactory Outstanding Unsatisfactory Satisfactory Outstanding Satisfactory Satisfactory Write necessary functions and put them in a module to process this…The history teacher at your school needs help in grading a True/False test. The students’ IDs and test answers are stored in a file. The first entry in the file contains answers to the test in the form:TFFTFFTTTTFFTFTFTFTTEvery other entry in the file is the student ID, followed by a blank, followed by the student’s responses. For example, the entry:ABC54301 TFTFTFTT TFTFTFFTTFTindicates that the student ID is ABC54301 and the answer to question 1 is True, the answer to question 2 is False, and so on. This student did not answer question 9. The exam has 20 questions, and the class has more than 150 students. Each correct answer is awarded two points, each wrong answer gets one point deducted, and no answer gets zero points. Write a program that processes the test data. The output should be the student’s ID, followed by the answers, followed by the test score, followed by the test grade. Assume the following grade scale:90%–100%, A; 80%–89.99%, B; 70%–79.99%, C; 60%–69.99%, D; and…Write a script file to play a simple number guessing game as follows. The script should generatea random integer in the range 1, 2, 3, . . ., 14, 15. It should provide for the player to makerepeated guesses of the number, and it should indicate if the player has won or give the player ahint after each wrong guess. The responses and hints are as follows:• “You won” and then stop the game.• “Very close” if the guess is within 1 of the correct number.• “Getting close” if the guess is within 2 or 3 of the correct number.• “Not close” if the guess is not within 3 of the correct number.
- Write a program that prompts the user for an input file name, reads all words from the input file, and writes the words to the output file named sentences.txt. Start a new line whenever a word ends in a period, question mark, or exclamation mark.Write a program that asks a user to input a file name and then reads the file and produces output. The file has the following format. Kim 8 10 6 4 Ivan 9 2 7 8 Sue 7 8 9 10 Kevin 4 657 The output should be each name followed by the average score. For example: Kim: 7.00 Ivan: 6.00 Sue: 8.50 Kevin: 5.55Write a computer program that calculates the bullet train’s constant rate of acceleration, given an initial speed of 200 mi/hr. Your program reads inputs; time intervals (t) and final velocity (vf ); from an input file and output the calculated acceleration value (a) to an output file. Hint: A bullet train slows from a speed of 200 mi/hr to 150 mi/hr in one minute. Use the equation below, where a is acceleration, t is time interval, vi is initial velocity, and vf is final velocity. Your source code should include following functions: - Main function that declares two files for input/output values, and calls the following function o A function that computes and return a, given t, vf, and vi