Answer:
T
Explanation:
The Marietta Country Club has asked you to write a program to gather, then display the results of the golf tournament played at the end of March. The Club president Mr. Martin has asked you to write two programs.
The first program will input each player's first name, last name, handicap and golf score and then save these records in a file named golf.txt (each record will have a field for the first name, last name, handicap and golf score).
The second program will read the records from the golf.txt file and display them with appropriate headings above the data being displayed.
If the score is = Par, then display 'Made Par'
If the score is < Par, then display 'Under Par'
If the score is > Par, then display 'Over Par'
There are 16 players in the tournament. Par for the course is 80. The data is as follows:
Andrew Marks 11.2 72
Betty Franks 12.8 89
Connie William 14.6 92
Donny Ventura 9.9 78
Ernie Turner 10.1 81
Fred Smythe 8.1 75
Greg Tucker 7.2 72
Henry Zebulon 8.3 83
Ian Fleming 4.2 72
Jan Holden 7.7 84
Kit Possum 7.9 79
Landy Bern 10.3 93
Mona Docker 11.3 98
Kevin Niles 7.1 80
Pam Stiles 10.9 87
Russ Hunt 5.6 73
Answer:
Explanation:
The following program is written in Python. It creates two functions, one for writting the players and their scores to the file, and another function for reading the file and outputting whether or not they made Par. The functions can be called as many times that you want and the writeFile function allows for 16 inputs to be made when called. A test case has been provided with all of the players mentioned in the question. The output can be seen in the attached image below.
def writeFile():
file = open('output.txt', 'w')
for x in range(16):
firstName = input("Enter First Name:")
lastName = input("Enter Last Name:")
handicap = input("Handicap:")
score = input("Score:")
file.write(str(firstName) + " " + str(lastName) + " " + str(handicap) + " " + str(score) + "\n")
file.close()
def readFile():
file = open('output.txt', 'r')
for line in file:
lineArray = line.split(" ")
if int(lineArray[-1]) < 80:
print(str(lineArray[0]) + " " + str(lineArray[1]) + " Under Par" )
elif int(lineArray[-1]) == 80:
print(str(lineArray[0]) + " " + str(lineArray[1]) + " Made Par")
else:
print(str(lineArray[0]) + " " + str(lineArray[1]) + " Over Par")
file.close()
writeFile()
readFile()
Write a function gcdRecur(a, b) that implements this idea recursively. This function takes in two positive integers and returns one integer.
''def gcdRecur(a, b):
'''
a, b: positive integers
returns: a positive integer, the greatest common divisor of a & b.
'''
# Your code here
if b == 0:
return a
else:
return gcdRecur(b, a%b)
#Test Code
gcdRecur(88, 96)
gcdRecur(143, 78)
© 2021 GitHub, Inc.
Answer & Explanation:
The program you added to the question is correct, and it works fine; It only needs to be properly formatted.
So, the only thing I did to this solution is to re-write the program in your question properly.
def gcdRecur(a, b):
if b == 0:
return a
else:
return gcdRecur(b, a%b)
gcdRecur(88, 96)
gcdRecur(143, 78)
Write a program using a dictionary that reads in a single positive digit number [0 - 9] from the user at the keyboard. Your program will then be able to look up the digit key in the dictionary and print the digit value spelled out. If the user types in a number that is either more than one digit, negative, or a non int value, re-prompt the user for valid input. First, before demonstrating your test cases, print out a display copy of the key:value pairs in your dictionary in sorted order. Deliverable: yournameLab4.py Your source code solution and a copy of the run pasted into your source submission file. Be sure to comment out your run so that your .py file will still run in the grader test bed. Validate user input is a single positive digit [0 - 9].
Answer:
The program in Python is as follows:
dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}
num = input("Number: ")
while(num.isdigit() == False or int(num)<0 or int(num)>9):
num = input("Number: ")
print(dict)
print(dict[int(num)])
Explanation:
#This initializes the dictionary
dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}
#This gets input from the user
num = input("Number: ")
#This loop is repeated until the user enters a valid input
while(num.isdigit() == False or int(num)<0 or int(num)>9):
num = input("Number: ")
#This prints the dictionary
print(dict)
#This prints the value of the key
print(dict[int(num)])
See attachment for sample run
We have an N x N square grid.
We will paint each square in the grid either black or white.
If we paint exactly A squares white, how many squares will be painted black?
A and N are integers,
Print the number of squares that will be painted black.
C++
Answer:
The solution in C++ is:
#include <iostream>
using namespace std;
int main(){
int N, A;
cout<<"Grids: "; cin>>N;
cout<<"White: "; cin>>A;
cout<<"Black: "<<N * N - A;
return 0;
}
Explanation:
This declares N and A, as integers
int N, A;
This gets inputs for N
cout<<"Grids: "; cin>>N;
This gets inputs for A, (the white grids)
cout<<"White: "; cin>>A;
This calculates and prints the number of black grids
cout<<"Black: "<<N * N - A;
PS
From the question, we understand that the grid is N by N square grids.
This means that:
[tex]Total = N * N[/tex]
So, the number of black grids is:
[tex]Black = Total - A[/tex]
2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality the earth takes longer to rotate around the sun. To account for the
difference in time every 4 years a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700 1800. etc.), the year must be evenly divisible by 400
Some example leap years are 600712 and 2016
Wirte a program that takes n a year and determines whether that year is a leap year.
Exif the inputs
1712
Answer:
The program in Python is as follows:
year = int(input("Enter a year: "))
print(year,end=" ")
if year % 4 == 0:
if year % 100 == 0:
if year % 400 == 0: print("is a leap year")
else: print("is not a leap year")
else: print("is a leap year")
else: print("is not a leap year")
Explanation:
This gets input for year
year = int(input("Enter a year: "))
This prints year, followed by a blank
print(year,end=" ")
If year is divisible by 4
if year % 4 == 0:
If yes, check if year is divisible by 100
if year % 100 == 0:
If yes, check if year is divisible by 400; print leap year if true
if year % 400 == 0: print("is a leap year")
print not leap year if year is not divisible by 400
else: print("is not a leap year")
print leap year if year is not divisible by 100
else: print("is a leap year")
print leap year if year is not divisible by 4
else: print("is not a leap year")
Answer:
def is_leap_year(user_year):
if(user_year % 400 == 0):
return True
elif user_year % 100 == 0:
return False
elif user_year%4 == 0:
return True
else:
return False
if __name__ == '__main__':
user_year = int(input())
if is_leap_year(user_year):
print(user_year, "is a leap year.")
else:
print(user_year, "is not a leap year.")
Explanation:
Consider a system with seven processes: E, F, G, H, I, J, K and six resources: U, V, W, X, Y, Z. Process E holds U and wants V. Process F holds nothing but wants W. Process G holds nothing but wants V. Process H holds X and wants V and W. Process I holds W and wants Y. Process J holds Z and wants V. Process K holds Y and wants X. Is this system deadlocked?
a. Yes
b. No
Answer:
a. Yes
Explanation:
System is deadlock due to process HIK. Process H holds X and wants V and W. Process I holds W and wants Y. Process K holds Y and wants X. The system will become deadlock due to these three different processes.
Scenario You are a network engineer and it is your first day working with ASU and you have been given the job of creating a network for the IT program. You are given the following three tasks to complete. 1. Configure IP addressing settings on network devices. 2. Perform basic device configuration tasks on a router. 3. Verify Layer 3 connectivity via a routing protocol. 4. Setup some access control lists.
Suppose that a disk unit has the following parameters: seek time s = 20 msec; rotational delay rd = 10 msec; block transfer time btt = 1 msec; block size B = 2400 bytes; interblock gap size G = 600 bytes. An EMPLOYEE file has the following fields: Ssn, 9 bytes; Last_name, 20 bytes; First_name, 20 bytes; Middle_init, 1 byte; Birth_date, 10 bytes; Address, 35 bytes; Phone, 12 bytes; Supervisor_ssn, 9 bytes; Department, 4 bytes; Job_code, 4 bytes; deletion marker, 1 byte. The EMPLOYEE file has r = 30,000 records, fixed-length format, and unspanned blocking.
Answer:
20
Explanation:
I hope it helps choose me the brainst
IN C++
A. Create an abstract base class called Currency with two integer attributes, both of which are non-public. The int attributes will represent whole part (or currency note value) and fractional part (or currency coin value) such that 100 fractional parts equals 1 whole part.
B. Create one derived class - Money - with two additional non-public string attributes which will contain the name of the currency note (Dollar) and currency coin (Cent) respectively. DO NOT add these attributes to the base Currency class.
C. In your base Currency class, add public class (C++ students are allowed to use friend methods as long as a corresponding class method is defined as well) methods for the following, where appropriate:
Default Construction (i.e. no parameters passed)
Construction based on parameters for all attributes - create logical objects only, i.e. no negative value objects allowed
Copy Constructor and/or Assignment, as applicable to your programming language of choice
Destructor, as applicable to your programming language of choice
Setters and Getters for all attributes
Adding two objects of the same currency
Subtracting one object from another object of the same currency - the result should be logical, i.e. negative results are not allowed
Comparing two objects of the same currency for equality/inequality
Comparing two objects of the same currency to identify which object is larger or smaller
Print method to print details of a currency object
All of the above should be instance methods and not static.
The add and subtract as specified should manipulate the object on which they are invoked. It is allowed to have overloaded methods that create ane return new objects.
D. In your derived Money class, add new methods or override inherited methods as necessary, taking care that code should not be duplicated or duplication minimized. Think modular and reusable code.
E. Remember -
Do not define methods that take any decimal values as input in either the base or derived classes.
Only the print method(s) in the classes should print anything to console.
Throw String (or equivalent) exceptions from within the classes to ensure that invalid objects cannot be created.
F. In your main:
Declare a primitive array of 5 Currency references (for C++ programmers, array of 5 Currency pointers).
Ask the user for 5 decimal numbers to be input - for each of the inputs you will create one Money object to be stored in the array.
Once the array is filled, perform the following five operations:
Print the contents of the array of objects created in long form, i.e. if the user entered "2.85" for the first value, it should be printed as "2 Dollar 85 Cent".
Add the first Money object to the second and print the resulting value in long form as above.
Subtract the first Money object from the third and print the resulting value in long form as above.
Compare the first Money object to the fourth and print whether both objects are equal or not using long form for object values.
Compare the first Money object to the fifth and print which object value is greater than the other object value in long form.
All operations in the main should be performed on Currency objects demonstrating polymorphism.
Remember to handle exceptions appropriately.
There is no sample output - you are allowed to provide user interactivity as you see fit.
Answer:
I only do Design and Technology
sorry don't understand.
Write the correct statements for the above logic and syntax errors in program below.
#include
using namespace std;
void main()
{
int count = 0, count1 = 0, count2 = 0, count3 = 0;
mark = -9;
while (mark != -9)
{
cout << "insert marks of students in your class, enter -9 to stop entering";
cin >> mark;
count++;
if (mark >= 0 && mark <= 60);
count1 = count1 + 1;
else if (mark >= 61 && mark <= 70);
count2 = count2 + 1;
else if (mark >= 71 && mark <= 100);
count3 = count3 + 1;
}
cout <<"Report of MTS3013 course" << endl;
cout <<"Mark" << count << endl << endl;
cout << "0-60" << "\t\t\t\t" << count1 << endl;
cout << "61-70" << "\t\t\t\t" << count2 << endl;
cout << "71-100" << "\t\t\t\t" << count3 << endl<< endl << endl;
cout << "End of program";
}
In which generation of computers are we in?
Study the following two class interfaces: class Question { public: Question(); void set_text(string new_text); void set_answer(string new_answer); void display() const; private: string text; string answer; }; class ChoiceQuestion : public Question { public: ChoiceQuestion(); void set_text(string new_text); }; Which member function from the Question class is overridden in the ChoiceQuestion class?
Answer:
The question function
Explanation:
The ChoiceQuestion function inherits from the Question class and should have it's functions and attributes as it is now a child of the Question class. It however overides the Question class function where it sets the ChoiceQuestion class function in the first function definition of the ChoiceQuestion class definition. This allows the child class to have it's own functions as well have access to the attributes and functions of the parent class.
Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.a. System.b. Satisfaction.c. Speedy.d. Subscriber.e. Switch.
Answer:
D. Subscriber
Explanation:
Digital Subscriber Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.
The high speed data transmission property helps to transmit data in a fast and timely manner between two or more points or people during calls, texts and other activities.
Given the snippet of code: int x = 5; int bar(int j) { int *k = 0, m = 5; k = &m; return (j+m); } void main(void) { static int i =0; i++; i = bar(i) + x; } Which variables obtain their memory from the stack? A. iB. jC. kD. mE. x
Answer:
Variables j , k , m will be stored in the stack.
Explanation:
Variable x will not be in stack as is it a global variable.
Variable i will not be in stack as is it a static variable.
Variable j will be in stack as is it a local variable in the function.
Variable m will be in stack as is it a local variable in the function.
Variable k , a pointer will be in stack as it is in the function bar locally.
The process by which the kernel temporarily moves data from memory to a storage device is known as what?
Answer: Swapping
Explanation:
Swapping is referred to as the process by which the kernel temporarily moves data from memory to a storage device.
Swapping is simply a memory management scheme whereby the process can be swapped temporarily from the main memory to the secondary memory in order for the main memory to be available for other processes. Swapping is used for memory utilization.
Discuss and illustrate the operation of the AND, OR, XOR and NOT gate of a Boolean logical operation giving examples of possible outcomes of 0 and 1 as input in a truth set tabular format.
Answer:
Use below picture as a starting point.
Select the correct statement(s) regarding PONS. a. only MMF cables can be used, since MMF enables greater data capacities compared to SMF b. PONS systems require active amplifiers, since high frequency signals attenuate quickly over distance c. PONS systems use passive devices between OLT and ONT d. all are correct statements
Answer:
The correct statement regarding PONS is:
c. PONS systems use passive devices between OLT and ONT
Explanation:
PON means Passive Optical Network. Based on fiber-optic telecommunications technology, PON is used to deliver broadband network access to individual end-customers. It enables a single fiber from a service provider to maintain an efficient broadband connection for multiple end-users (homes and small businesses). OLT means Optical Line Terminal, while ONT means Optical Network Terminal. They provide access to the PON.
I have a Dell laptop and last night it said that it needed to repair it self and asked me to restart it. So I did but every time I turn it on it shuts itself down. I had a problem exactly like this before with my old computer, was not a Dell though, and I ended up having to have it recycled. This computer I have now is pretty new and I really don't want to have to buy a new computer. What should I do to fix this problem? Please help, I'm a college student almost ready to graduate and all of my classes are online. I'm starting to panic. Thanks for helping me figure this situation out.
The same thing happened with my HP laptop but my dad refresh the laptop before restating it worked
If one wish to create a loop such that it will continuously add time elapsed between two functions with variable computation time until 1 hour is passed, what type of loop would be best
"Between two functions" not sure of what you mean there but here's a quick way to execute a function for an hour
Answer and Explanation:
var interval=setInterval(function(){
var i=0;
for (i=0; i <=60; i++){
for (i=0; i <70; i++){
console.log(i); }
}}, 60000);
The Fourth Amendment does not allow police to randomly test people for drunk driving. True or False
Answer:
False
Explanation:
When considering the mobility aspect of cloud-based enterprise systems, it's important to consider that with a cloud-based system, employee can access information from _____.
Answer:
anywhere in the world
Explanation:
Employee can access information from anywhere in the world. That is the main upside of using cloud-based enterprise system. They run completely remote and are accessible from anywhere as long as you have an internet connection and authorized access to the system. This increased accesibility is crucial for companies that have employees that move from place to place solving problems and solves many of the problems with on-site systems.
when describing a software lincense what does the phrase "open source" mean?
Select the correct answer.
What testing approach does a development team use when testing the developed code rather than just the functionality of the code?
A.
white box testing
B.
black box testing
C.
acceptance testing
D.
usability testing
Answer:
D. usability testing
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis and requirements.
3. Software design and prototyping.
4. Development (coding).
5. Integration and testing
6. Deployment.
7. Operations and maintenance.
Usability testing is a testing technique used by a software development team to test a developed code rather than just the functionality of the code.
The main purpose of usability (user experience) testing is to determine how easy, user-friendly or difficult it is for end users (real people) to use a software application or program.
describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.
Answer:
Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.
What are some of the advantages and disadvantages of connection-oriented WAN/Man as opposed to connection-less?
Answer and Explanation:
Connection oriented WAN/MAN as opposed to connection less network is a type of wide area network that requires communicating entities in the network to establish a dedicated connection for their communication before they start communicating. This type of network will use these established network layers only till they release it, typical of telephone networks.
Advantages include:
Connection is reliable and long.
Eliminates duplicate data issues.
Disadvantages include:
Resource allocation while establishing dedicated connection slows down speed and may not fully utilize network resources.
There are no plan B's for network congestion issues, albeit occurring rarely with this type of network.
what is example of application of machine learning that can be imposed in eduction. (except brainly.)
Answer:
Machine Learning Examples
Recommendation Engines (Netflix)
Sorting, tagging and categorizing photos (Yelp)
Self-Driving Cars (Waymo)
Education (Duolingo)
Customer Lifetime Value (Asos)
Patient Sickness Predictions (KenSci)
Determining Credit Worthiness (Deserve)
Targeted Emails (Optimail)
Identify some advantages of using Excel over lists, paper files, or simple word documents? Describe some disadvantages of using Excel over lists, paper files, or simple word documents? Summarize one thing in you home life that could be improved or more easily managed using Excel?
Excel
Excel is a software program that contains spreadsheet. Spreadsheet is an electric document that works numbers and display results in graphs. There are vertical columns and horizontal rows.
they are several advantages of excel which is;
Excel is very efficient to use, especially when you have to calculate your data, it's not hard to calculate the computer itself calculates it for you.they are also disadvantages of excel which is;
some users might get a little bit problem when you send Microsoft Excel, here is one sometimes the spreadsheet are difficult to share internally.1. What does the word “processing” in data pro- cessing mean?
2. Give three examples in which raw data also serves as useful information.
3. Give three business examples (not mentioned in the text) of data that must be processed to provide useful information.
4. Give three examples of subsystems not operat- ing in the context of IT. Why are these consid- ered subsystems and not systems?
5. How do TPSs and DSSs differ?
6. What is a problem? Give an example of a busi- ness problem and discuss how a computer- based information system could solve it.
7. What is synergy? How is synergy accomplished when a person uses a computer? Explain the connection between synergy and increased productivity.
8. “An information system consists of hardware and software.” Why is this statement inadequate?
9. In which situations does one need to make a decision? Give three examples not mentioned in the chapter.
10. How can a DSS help make decisions?
11. Note the word “support” in decision support systems. Why are these applications not called decision-making systems?
12. Who is considered a knowledge worker? Will you have a career as a knowledge worker? Explain.
13. What is the most prevalent type of information system? Why is this type of IS so ubiquitous?
14. TPSs are usually used at the boundaries of the organization. What are boundaries in this context? Give three examples of boundaries.
15. Among IT professionals, the greatest demand is for network administrators and analysts. Why?
Answer:
Word processing is the process of creating and editing documents on a computer. It allows a user to create documents that mimic the format and style of a typical typewriter. It requires a computer and word processing software. A printer may also be used to create a physical copy of the document.
Explanation:
There is an interface I that has abstract class AC as its subclass. Class C inherits AC. We know that C delegates to an object of D to perform some computations. Besides, C consists of two C1s and one C2 as subcomponents. Object of C2 is still reusable when its major component C is depleted. C1 has a method that takes in an object of E as argument. Which one is invalid
Answer:
are u in HS or college work
I am trying to understand
H0: Protype design has at most 37mpg vs. HA: prototype design has greater than 37mpg. If H0 is rejected, the action will be move the protype deisgn to prpduction. What kind of test is required
Answer:
A one-tailed test with upper reject region
Explanation:
H0 : μ ≤ 37
H1 : μ > 37
This is a right tailed tailed test as indicated by the greater than symbol on the hypothesis defined. Hence, the critical region will lie to the right of the area under the curve.
Critical region which lies to the right of the curve is called the upper rejection region.
Rejecting the Null, H0 means that ; the value of the test statistic exceeds the critical value;
When the hypothesis is declared with the less than sign, rejection region lies to the left or lower region.
While a two tailed test has rejection region shares between each tail.