Y USING C++, SOLVE THE FOLLOWING QUESTION. Based on the coding attached, further modify the C++ program to ask the user for two numbers. Store the two numbers the user entered in two int variables. Print out the sum of these variables. For example, if the user entered 3 and 5, print out, “The sum of 3 and 5 is 8”.
Q: How exactly do you go about setting up and managing both physical and virtual networking devices…
A: Virtual networking facilitates more centralization and simplification of network administration.
Q: Consult the web or the publications provided in the section on References and Suggested Readings to…
A: Ethics and Professional Practices: The software engineering code of ethics and professional…
Q: Give an asymptotic estimate, using the Θ-notation, of the number of letters printed by the…
A: Here is the time complexity of the given function and the explanation to it.
Q: A core principle of software engineering practice is "divide and conquer," and it should be stressed…
A: SOC design: A collection of diverse components and/or subsystems that are linked in order to fulfil…
Q: What sort of hardware does data warehousing require?
A: First, please provide some background on the data warehouse. It is a data management system that…
Q: Which of the following things, flash memory, DVD-RW, ROM, hard disc, and microprocessor, corresponds…
A: Von Neumann model: The Von Neumann architecture has a shared memory for programmes and data, a…
Q: Why don't we employ magnetic tape as the principal storage media in our organization?
A: Answer:
Q: Public key cryptography had to cope with the issue of distributing keys in the early stages of its…
A: Public key Cryptography: Public key cryptography is a kind of encryption that requires two distinct…
Q: Describe the different ways in which a developer can increase their knowledge of site design.
A: Learning web design is crucial for web developers since it offers several benefits. Therefore,…
Q: What's the difference between static and dynamic memory allocation?
A: Difference between static and dynamic memory allocation:
Q: Describe TWO (2) typical examples of problems solved by a systems analyst and the steps that he/she…
A: The answer is given in the below step
Q: Does the migration from servers located on-premises to an architecture based on infrastructure as a…
A: Is there a governance problem with shifting from on-premise servers to an IaaS architecture: The…
Q: What exactly is meant by "parallel processing"?
A: explain parallel processing.
Q: What is the procedure for obtaining Application Software? Explain your argument in full and provide…
A: Application Software: Pricing is crucial, but it shouldn't be the primary concern. If you solely…
Q: Q2: Develop a computer program in F90 to form the matrix A(n , n) as shown below. The program also…
A: Find Your Code Below
Q: In your capacity as a systems analyst, what practices do you recommend for ensuring that the basis…
A: System analysts are the individuals responsible for the upkeep and development of the computer…
Q: What is command line arguments? Write its syntax.
A: Command-line arguments are given after the name of the program in command-line shell of operating…
Q: What exactly is meant by the term "autonomic computing," and how does it contribute to the efficient…
A: Answer:
Q: Software that is web-based is software that can be accessed and operated over the internet.
A: A collection of instructions for a machine to carry out a set of predetermined responsibilities is…
Q: Write a program to interchange value of two numbers using call by reference.
A: Introduction We have to write a program to interchange value of two numbers using call by reference.…
Q: What are the advantages of operating systems that are not device-specific?
A: The solution to the given question is: Here are the main advantages of a device-independent…
Q: Which model combines the iterative nature of prototyping with the linear sequential model's…
A: Spiral Model: Spiral Model combines the iterative nature of prototyping with the regulated and…
Q: Why is MetaData the most crucial component of a data warehouse?
A: A database is any collection of data organized for storage, accessibility, and retrieval. Data…
Q: Design an usecase documentation for any 2 modules .For the same 2 modules prepare testcases for the…
A: User case diagram:
Q: Blockchain and cryptocurrency are trendy now. Explain how blockchain technology affects…
A: A blockchain is a distributed ledger that records every transaction within a particular…
Q: Examine the differences between physical and logical memory. How much memory is allocated in a…
A: Address Logical: The CPU creates a logical address when a programmed is being executed. The logical…
Q: Why do we need cache memory, which is also transistor-based, if RAM (Random Access Memory) is a…
A: Random Access Memory : Random Access Memory (RAM) is a kind of memory incorporated into the…
Q: Give an example of a machine problem or application where logic programming is applicable. Explain.
A: Logic programming is a programming paradigm which is generally founded on conventional rationale.…
Q: Assume a software developer approaches you about developing a hospital patient management system.…
A: Answer: The term "uniform resource locator" refers to an address that may be found on the Internet…
Q: how can you convice someone to read the book?
A: how can you convice someone to read the book?
Q: Create a flowchart, pseudocode and program program to find the average of 10 numbers using while…
A: Find the required flowchart, pseudocode and program given as below and output :
Q: Do cohesion and coupling have any bearing on software development? To produce better software, how…
A: Given: Cohesiveness illustrates the interconnections of the module's components. Coupling…
Q: When doing an evaluation of cloud technology, what kind of precautions should a company take?
A: Cloud Technology: The term "cloud computing" refers to the on-demand availability of computer system…
Q: Science of computers Are there actions that can be done throughout the software development process…
A: INTRODUCTION: Here we need to tell the Science of computers Are their actions that can be done…
Q: Why are algorithms taken into account while creating Data Structures?
A: Answer: Within the context of space exploration initiatives, the use of computer algorithms plays an…
Q: A computer-based system may have four different sorts of requirements. Identify and briefly explain…
A: Generally, every system requirement are intended to communicate the functions that the system should…
Q: To what extent may design patterns be used to their full potential in software development? Give…
A: Design Patterns: Design patterns denote the best practices seasoned object-oriented software…
Q: Why garbage collection is required in Java?
A: In java programming language the term garbage means unreferenced objects.
Q: Write a program to generate the following pyramid
A: No programming language is specified so using c++. I have provided the code and output in step2.
Q: How to avoid coherence problems with scalable shared memory multiprocessors? What are the drawbacks?
A: Coherence Problems: Cache Coherence is a Problem When many processors run in parallel and numerous…
Q: Why are algorithms taken into account while creating Data Structures?
A: The answer is given in the below step
Q: Make java program that gives output to determine if a connected simple graph has independent sets &…
A: "public class Main { public static void main(String[] args) {int n = 7; int[][] diagram = [0, 1, 0,…
Q: Do you think cloud storage is a better option than traditional client storage software?
A: Given: I now use Google Drive and have used OneDrive, Box, and Dropbox in the past, so I can attest…
Q: What role does a database's use of foreign keys have in ensuring the database's integrity? What kind…
A: Foundation: A database key that joins two tables is referred to as a "foreign key." The FOREIGN KEY…
Q: Explain the process of producing software applications that run on the web in as few words as…
A: Given: the procedure for developing web-based softwarethe technique for programming web-based…
Q: What are some of the benefits and drawbacks associated with dynamic RAM?
A: Answer:
Q: Provide a comprehensive explanation of the A* algorithm.
A: The solution is: Algorithm is a searching algorithm that looks for the shortest path between the…
Q: Spell APPLE Using the array below ? P.
A:
Q: Is there a governance challenge involved in transitioning from servers hosted on-premises to an…
A: Introduction:Architecture of Ia As:In the Ia As model, cloud providers host infrastructure such as…
Q: Convert the octal NUMBER 3611. 2151 to hexadecimal number showing the steps (Note: The problem…
A:
BY USING C++, SOLVE THE FOLLOWING QUESTION.
Based on the coding attached, further modify the C++
Step by step
Solved in 2 steps
- #include using namespace std; int main() { int type; double Vth, Vg, Vd, Vs; cin>>type>>Vth>>Vg>>Vd>>Vs; return 0; }C++ code: int v = 0, w = 1, int main(void) { W = z; V = W + x; y = W X; Z = z -1; } X = 2, y = = 3, z = 5;== include using namespace std; # int main () { int a = 14; do { if( a 15) { a = a + 1; } cout << a <<" "; a = a + 1; } while( a < 16 ); } الجواب: إجابة
- #include using namespace std; int main() { } int kidsInClass1; int kidsInClass2; int numClasses; double kidsAvgMethodl; double kidsAvgMethod2; kidsInClass1= 3; kidsInClass2 = 2; numClasses = 2; Type the program's output kidsAvgMethodl = static_cast (kidsInClass1 + kidsInClass2) /static_cast (numClasses); kidsAvgMethod2 (kidsInClass1 + kidsInClass2) / numClasses; cout << kidsAvgMethod1 << endl; cout << kidsAvgMethod2 << endl; return 0; =Usernames An online company needs your help to implement a program that verifies the username chosen by a new user. Their rules is described below: Username MUST contain at least 6 characters; Username cannot start with a number; Username can only contain letters or numbers. If valid, the username may be resgistered if it doesn't already exist in the system. You should not use built-in functions to determine the character type such as isnumeric() or islower(). Use the strings given alphabet and numeric to determine if each character is valid. Use the list registered to help you determine if the username is already registered. Don't forget to execute the cell below to use these strings # run this cell to create these variablesalphabet = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz'numeric = "0123456789"registered = ["john87", "topmage", "light4ever", "username2"] Write a function nameValidation which receives a String argument name. This function: has name String…Usernames An online company needs your help to implement a program that verifies the username chosen by a new user. Their rules is described below: Username MUST contain at least 6 characters; Username cannot start with a number; Username can only contain letters or numbers. If valid, the username may be resgistered if it doesn't already exist in the system. You should not use built-in functions to determine the character type such as isnumeric() or islower(). Use the strings given alphabet and numeric to determine if each character is valid. Use the list registered to help you determine if the username is already registered. Don't forget to execute the cell below to use these strings # run this cell to create these variablesalphabet = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz'numeric = "0123456789"registered = ["john87", "topmage", "light4ever", "username2"]
- Usernames An online company needs your help to implement a program that verifies the username chosen by a new user. Their rules is described below: Username MUST contain at least 6 characters; Username cannot start with a number; Username can only contain letters or numbers. If valid, the username may be resgistered if it doesn't already exist in the system. You should not use built-in functions to determine the character type such as isnumeric() or islower(). Use the strings given alphabet and numeric to determine if each character is valid. Use the list registered to help you determine if the username is already registered. Don't forget to execute the cell below to use these strings # run this cell to create these variablesalphabet = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz'numeric = "0123456789"registered = ["john87", "topmage", "light4ever", "username2"] Write a function registerName which receives a String username and it returns a string message. This…TIME CLASS (C++) - Write a time class named timeClass - Write code to demonstrate that it works - The timeclass class will be named timeClass - The class must have these 3 constructors: #1) timeClass(); #2) timeClass(int h, int m, int s); #3) timeClass (string timeIn); - The string constructor must be capable of being separated by colons or blanks time in the 24-hour format: example 23:11:07 or 9:4:9 or 11 31 27 - DO NOT use some system functions for this assignment. You must write the code. - Yes, you can convert from string to integer stoi ( string). - In addition to the constructors, you should supply a set of getters (Accessors) getH, getM getS - In addition to that, add mutators that allow the individual setting of Hours, Minutes and Seconds: setH(int), setM ( int ) setS( int ) Include this setter ( Mutator) setTime( int NumSeconds); - So if I call setTime( 7673) you would know that that is: -- hours, -- minutes and -- seconds seconds = 53 7673 % 60…Briefly explain default argument initializer
- TIME CLASS (Language: C++) - Write a time class named timeClass - Write code to demonstrate that it works - The timeclass class will be named timeClass - The class must have these 3 constructors: #1) timeClass(); #2) timeClass(int h, int m, int s); #3) timeClass (string timeIn); - The string constructor must be capable of being separated by colons or blanks time in the 24-hour format: example 23:11:07 or 9:4:9 or 11 31 27 - DO NOT use some system functions for this assignment. You must write the code. - Yes, you can convert from string to integer stoi ( string). - In addition to the constructors, you should supply a set of getters (Accessors) getH, getM getS - In addition to that, add mutators that allow the individual setting of Hours, Minutes and Seconds: setH(int), setM ( int ) setS( int ) Include this setter ( Mutator) setTime( int NumSeconds); - So if I call setTime( 7673) you would know that that is: -- hours, -- minutes and -- seconds seconds = 53 7673…#include<bits/stdc++.h>using namespace std; // Class representing music dataclass Song {public:string musicName, musicDescription;};// Function to take input for music descriptionSong addDescription(){Song s1;cout<<"Enter the Music name : ";cin>>s1.musicName;cout<<"Enter the Music description : ";cin>>s1.musicDescription;return s1;} // Function to write music object details into a txt filevoid storeInfoToDatabase(Song s){ofstream fileObject;// Opening the file in append modefileObject.open("Database.txt", ios::app);fileObject << s.musicName;fileObject << " ";fileObject << s.musicDescription;fileObject << "\n";} // Driver Functionint main(){Song s = addDescription();storeInfoToDatabase(s);cout<<"Data written into file succesfully...";return 0;}C++HurdleGame The HurdleGame class contains all the functions invoked as a result of a user action (i.e. when a user presses a key on the Hurdle Frontend, one of the functions in HurdleGame will be called. A HurdleGame object comprises a HurdleWords object (which stores all valid guesses and valid Hurdles), and a HurdleState object, which stores and tracks all the game states. Any action should update the HurdleState object.Each function in HurdleGame is called as a result of a user action on the Hurdle Frontend. To understand this, please read the Hurdle Backend API section below before implementing. You are responsible for implementing each of the functions below. LetterEntered ● Called by the Hurdle frontend when the user enters a letter. ● Hint: when a user enters a letter, how should the underlying HurdleState be modified to reflect the change resulting from that key press? WordSubmitted ● Called by the Hurdle front end when the user submits a guess by pressing enter. ● Hint: when…