Answer:
C. Resource Pool share value.
Explanation:
The vSphere is a term used to describe the VMware’s virtualization cloud platform. The vSphere comprises of the following, vCenter Server, ESXi, Virtual Machine File System (VMFS) and vCenter Client.
If a vSphere Administrator receive complaints that a database Virtual Machine (VM) is experiencing performance issues and the Virtual Machine (VM) is a member of the high priority resource pool and the cluster has not experienced contention.
In order to address immediate performance concerns, the vSphere Administrator should check the Resource Pool share value.
VMware resource pool refers to the aggregated central processing unit and memory allocated to a Virtual Machine (VM) for flexible management of the resources.
Also, the vSphere Administrator should install VMware tools to check which processes are having high CPU usage by using vimtop, as well as checking if vCenter Server is swapping.
write the following function so that it returns the same result, but does
not increment the variable ptr. Your new program must not use anysquare brackets, but must use an integer variable to visit each double in the array. You may eliminate any unneeded variable.
double computeAverage(const double* scores, int nScores)
{
const double* ptr = scores;
double tot = 0;
while (ptr != scores + nScores)
{
tot += *ptr; } ptr++;
}
return tot/nScores;
b. Rewrite the following function so that it does not use any square brackets (not even in the parameter declarations) but does use the integervariable k. Do not use any of the functions such as strlen, strcpy, etc.
// This function searches through str for the character chr.
// If the chr is found, it returns a pointer into str where
// the character was first found, otherwise nullptr (not found).
const char* findTheChar(const char str[], char chr)
{
for(intk=0;str[k]!=0;k++)
if (str[k] == chr)
}
return &str[k];
return nullptr;
}
c. Now rewrite the function shown in part b so that it uses neither square brackets nor any integer variables. Your new function must not use any local variables other than the parameters.
Answer:
Explanation:
a.
// Rewriting the given function without using any square brackets
double computeAverage(const double* scores, int nScores)
{
const double* ptr = scores;
double tot = 0;
int i;//declaring integer variable
for(i=0;i<nScores;i++)
{
//using an integer variable i to visit each double in the array
tot += *(ptr+i);
}
return tot/nScores;
}
b.
// Rewriting the given function without using any square brackets
const char* findTheChar(const char* str, char chr)
{
for(int k=0;(*(str+k))!='\0';k++)
{
if ((*(str+k)) == chr)
return (str+k);
}
return nullptr;
}
c.
//Now rewriting the function shown in part b so that it uses neither square brackets nor any integer variables
const char* findTheChar(const char* str, char chr)
{
while((*str)!='\0')
{
if ((*str) == chr)
return (str);
str++;
}
return nullptr;
}
For this assignment, you will create flowchart using Flowgorithm and Pseudocode for the following program example:
Hunter Cell Phone Company charges customer's a basic rate of $5 per month to send text messages. Additional rates apply as such:
The first 60 messages per month are included in the basic bill
An additional 10 cents is charged for each text message after the 60th message and up to 200 messages.
An additional 25 cents is charged for each text after the 200th message
Federal, state, and local taxes add a total of 12% to each billThe company wants a program that will accept customer's name and the number of text messages sent. The program should display the customer's name and the total end of the month bill before and after taxes are added.
Answer:
The pseudocode is as given below in the explanation while the flow diagram is attached herewith
Explanation:
The pseudocode is as follows
input cust_name, num_texts
Set Main_bill=5 $;
if the num_texts is less than or equal to 60
Excess_Charge=0;
If the num_texts is greater than 60 and less than or equal to 200
num_text60200 =num_texts-60;
Excess_Charge=0.1*(num_text60200);
else If the num_texts is greater than 60
num_texts200 =num_texts-200;
Excess_Charge=0.25*(num_texts200)+0.1*(200-60);
Display cust_Name
Total_Bill=Main_bill+Excess_Charge;
Total_Bill_after_Tax=Total_Bill*1.12;
A number of LC-3 instructions have an "evaluate address" step in the instruction cycle, in which a 16-bit address is constructed and written to the Memory Address Register via the MARMUX. List all LC-3 instructions that write to the MAR during the evaluate address phase of the instruction cycle, with the Register Transfer description of each.
Answer: you want to list all LC structers
Explanation:
In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that are ____________. These processes safeguard against any risks that might occur due to key staff being unavailable or distracted.
Answer:
automated
Explanation:
Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.
What is a digital security risks?
Answer:
A digital security risk is an action that could result in damage to a computer or similar device's hardware, software, data etc.
A/an ____ file saves a workbook as a comma-delimited text file for use on another windows operating system??
A. XPS
B. TXT
C. ODS
D. CVS
Answer:
The correct option is D
D) CVS
Explanation:
A CVS file saves a workbook as a comma-delimited text file for use on another windows operating system. It ensures that line breaks, tab characters and other characteristics are interpreted correctly.
A CVS file stands for Comma Separated Value file, which basically allows the data to be saved in tabular format. However they differ from other spreadsheet file types because you can only have a single sheet in a file. Moreover, you cannot save cell, column or row in it.
Let K(x, y) denote the statement "x knows y" and D denote the domain of all people. Express the following English sentences as a quantified proposition using the definitions above:
1. Everybody knows somebody.
2. There is somebody that no one knows.
3. There is no one who knows everybody
Answer:
Given: K(x,y) denotes statement:
"x knows y"
D denote domain of all people.
Explanation:
1. Everybody knows somebody.
Solution:
∀x∈D ∃y∈D : K(x, y)
∀ means for all. Here it is used for Everybody.
∃ means there exists some. Here it represents Somebody.
∈ means belongs to . Both x and y belongs to the domain D of all people.
2. There is somebody that no one knows.
Solution:
∀x∈D ∃y∈D : ¬K(x, y)
∀ means for all. ∃ means there exists some. ∈ means belongs to both x and y belongs to the domain D of all people.¬ this is negation sign which means not K(x,y). So the negation of everybody knows somebody can be expressed as there is somebody that no one knows.
3. There is no one who knows everybody
Solution:
This can be represented in both the ways below.
∀ y∈D ∃ x∈D : K(x, y)
∀ means for all. ∃ means there exists some. ∈ means belongs to both x and y belongs to the domain D of all people.
∀x∈D ∀y∈D : ¬K(x, y)
∀ means for all. The negation shows that there is no one who knows everybody.
random integer between 3 and 13 (inclusive)
Answer:
6
Explanation:
Answer:
4
Explanation:
It is between 3 and 13. Please answer some of my questions too! :)
Using MARS/MIPS
A) Write a program which increments from 0 to 15 and display results in Decimal on the console
B) Modify above program to increment from 0 to 15 and display results in Hexadecimal on the console
Answer:
Explanation:
MIPS program which increments from 0 to 15 and display results in Decimal on the console
In this program the user defined procedures print_int and print_eot were used to print the integer values and new line characters(\n) respectively.the mechanisam of the loop is explaine in the comment section of the program.
addi $s0, $0, 0
addi $s1, $0, 15
print_int:
li $v0, 1 # system call to print integer
syscall
jr $ra # return
print_eol: # prints "\n"
li $v0, 4
la $a0, linebrk
syscall
jr $ra # return
main: . . .
li $a0, 0 # print 0
jal print_int # print value in $a0
loop: move $a0, $s0 # print loop count
jal print_int
jal print_eol # print "\n" character
addi $s0, $s0, 1 # increment loop count by 1
ble $s1, $s0, loop # exit if $s1<$s0
beq $s0, $0, end
end:
MIPS progam to increment from 0 to 15 and display results in Hexadecimal on the console
this program is slightly differed from the previous program in this program the system call issued in print_int is implemented with a system call that prints numbers in hex.
addi $s0, $0, 15
addi $s1, $0, 0
print_int:
li $v0,34 # syscall number for "print hex"
syscall # issue the syscall
jr $ra # return
print_eol: # prints "\n"
li $v0, 4
la $a0, linebrk
syscall
jr $ra # return
main: . . .
li $a0, 0 # print 0
jal print_int # print value in $a0
loop: move $a0, $s0 # print loop count
jal print_int
jal print_eol # print "\n" character
addi $s0, $s0, 1 # increment loop count by 1
ble $s1, $s0, loop # exit if $s0>$s1
beq $s0, $0, end
end:
Write a program that reads in investment amount, annual interest rate, and number of years, and displays the future investment value using the following formula: futureInvestmentValue = investmentAmount * (1 + monthyInterestRate)numberOfYears*12. For example if you enter amount 1000, annual interest rate 3.25%, and number of years 1, the future investment value is 1032.98.NB: Please make sure to use the NumberFormat coding for currency to display your results. (Java Programming)
Answer:
Following are the code to this question:
import java.util.*; //importing package for user input
public class Main //defining class
{
public static void main(String []ar) //defining main method
{
double investment_amount,interest_rate,future_investment_value; //defining double variables
int years; //defining integer variable
Scanner obx=new Scanner(System.in); //creating Scanner class Object
System.out.print("Enter invest value: "); //print message
investment_amount=obx.nextDouble(); //input value
System.out.print("Enter interest rate: ");//print message
interest_rate=obx.nextDouble();//input value
System.out.print("Enter number of years: ");//print message
years=obx.nextInt();//input value
future_investment_value=investment_amount*Math.pow((1+interest_rate/1200.),years*12); //calculating value by apply formula
System.out.println("you enter amount: $"+investment_amount); //print calculated value
System.out.println("annual interest rate:"+interest_rate+"%");//print calculated value
System.out.printf("Number of years: "+years+" the future investment value is :$%.2f\n",future_investment_value);//print calculated value
}
}
output:
please find the attachment.
Explanation:
Program Description:
In the above-given program, inside the main method, a variable is declared that are investment_amount, interest_rate, future_investment_value, and years, in which only year variable is an integer type and other variables are double types.In the next step, a scanner class object that is "obx" is created, which is used to input value from the user end, in the next line we apply the formula to calculate the future_investment_value.At the last step, we all the input and a calculated valuepublic class Student {
private String getFood() {
return "Pizza";
}
public String getInfo() {
return this.getFood();
}
}
public class GradStudent extends Student {
private String getFood() {
return "Taco";
}
public void teach(){
System.out.println("Education!");
getInfo();
}
}
What is the output from this:
Student s1 = new GradStudent();
s1.teach();
Education! would be printed, followed by a run-time error when getInfo is called.
Education! Pizza
This code won't run because it won't compile.
Education! Taco
This code causes a run-time error because getInfo is not declared in the GradStudent class.
Answer:
getInfo(); ==
getSy.Info()
Explanation:
Get System Info
You are writing a paragraph in a word processor. You
want to use the same text that appears elsewhere in a
different document, but you want to keep it in the other
document. To get the other text into the new document
most efficiently, you should:
Cut and paste
Ctrl + S
Copy and paste
Print the text and retype it so you don't make any mistakes.
Answer:
Explanation:
I mean I would copy and paste it. I hope thats right
A(n) ________ is a server-based operating system oriented to computer networking and may include directory services, network management, network monitoring, network policies, user group management, network security, and other network-related functions.
Answer:
Network Operating System (NOS)
Explanation:
A network operating system (NOS) is an operating system that makes different computer devices connect to a common network in order to communicate and share resources with each other using a server. A network operating system can be used by printers, computers, file sever among others, and they are connected together using a local area network. This local area network which they are connected to works as the server.
The NOS also acts as a network security because it could be used as an access control or even user authentication.
There are two types of NOS
1) Peer to peer network operating system.
2) Client/server network operating system
A network operating system (NOS) is a server-based operating system oriented to computer networking and may include directory services, network management, network monitoring, network policies, user group management, network security, and other network-related functions.
Three examples of parameter-parsing implementation models are: (1)________, (2)________, and (3)________.
Answer:1) Parse-by-value
2) Parse-by-reference
3) Parse-by-name
Explanation: Parameter parsing refers to a communication among procedures or functions.
The values of a variable procedure are transferred to the called procedure by some mechanisms. Different techniques of parameter-parsing include; parse-by-value, parse-by-reference, parse-by-copy restore, parse-by-name.
Consider the following skeletal C-like program:
void fun1(void); /* prototype */
void fun2(void); /* prototype */
void fun3(void); /* prototype */
void main() {
int a, b, c;
. . .
}
void fun1(void) {
int b, c, d;
. . .
}
void fun2(void) {
int c, d, e;
. . .
}
void fun3(void) {
int d, e, f;
. . .
}
Given the following calling sequences and assuming that dynamic scoping is used, what variables are visible during execution of the last function called? Include with each visible variable the name of the function in which it was defined
a. main calls funl; funl calls fun2; fun2 calls fun3
b. main calls fun1; fun1 calls fun3
c. main calls fun2; fun2 calls fun3; fun3 calls funl
d. main calls fun1; funl calls fun3; fun3 calls fun2.
Answer:
In dynamic scoping the current block is searched by the compiler and then all calling functions consecutively e.g. if a function a() calls a separately defined function b() then b() does have access to the local variables of a(). The visible variables with the name of the function in which it was defined are given below.
Explanation:
a. main calls fun1; fun1 calls fun2; fun2 calls fun3
Solution:
Visible Variable: d, e, f Defined in: fun3Visible Variable: c Defined in: fun2 ( the variables d and e of fun2 are not visible)Visible Variable: b Defined in: fun1 ( c and d of func1 are hidden)Visible Variable: a Defined in: main (b,c are hidden)b. main calls fun1; fun1 calls fun3
Solution:
Visible Variable: d, e, f Defined in: fun3 Visible Variable: b, c Defined in: fun1 (d not visible)Visible Variable: a Defined in: main ( b and c not visible)c. main calls fun2; fun2 calls fun3; fun3 calls fun1
Solution:
Visible Variable: b, c, d Defined in: fun1 Visible Variable: e, f Defined in: fun3 ( d not visible)Visible Variable: a Defined in: main ( b and c not visible)Here variables c, d and e of fun2 are not visible .
d. main calls fun1; fun1 calls fun3; fun3 calls fun2
Solution:
Visible Variable: c, d, e Defined in: fun2Visible Variable: f Defined in: fun3 ( d and e not visible)Visible Variable: b Defined in: fun1 ( c and d not visible)Visible Variable: a Defined in: main ( b and c not visible)Write a program that reads a list of words. Then, the program outputs those words and their frequencies. Ex: If the input is: hey hi Mark hi mark the output is: hey 1 hi 2 Mark 1 hi 2 mark 1
Answer:
#Declare variable to get the input
#list from the user
input_list = input()
#split the list into words by space
list = input_list.split()
#Begin for-loop to iterate each word
#to get the word frequency
for word in list:
#get the frequency for each word
frequency=list.count(word)
#print word and frequency
print(word,frequency)
Explanation:
This program that we are told to write will be done by using python programming language/ High-level programming language.
The question wants us to write a program in which the output will be as below;
hey 1
hi 2
Mark 1
hi 2
mark 1
Just by imputing hey hi mark hi mark.
Just copy and run the code below.
#Declare variable to get the input
#list from the user
input_list = input()
#split the list into words by space
list = input_list.split()
#Begin for-loop to iterate each word
#to get the word frequency
for word in list:
#get the frequency for each word
frequency=list.count(word)
#print word and frequency
print(word,frequency)
In this exercise we have to use the knowledge in computational language in python to write the following code:
We have the code can be found in the attached image.
So in an easier way we have that the code is
input_list = input()
list = input_list.split()
for word in list:
frequency=list.count(word)
print(word,frequency)
See more about python at brainly.com/question/18502436
Write Python code to save the data to a MongoDB collection:Import json module to parse JSON dataImport MongoClient from pymongo to use MongoDBCreate a loop to iterate through the variable with data from Twitter, and for each tweet:Parse these related values: id, text, created_at, user’s screen_name, retweet_count, favorite_count, lang.Use MongoDB’s insert method to add the parsed tweet values to MongoDB collection;Write Python code to query the database:Use find method to search for tweets with lang="en";Use the aggregate method with $sum to compute the total retweets;Use the aggregate method with $count and $group to count the number of tweets by each user (screen_name);
Answer:
Explanation:
The objective of this task is to compute a program that involves the usage of Python code to save the data to MongoDB and to query the database.
Due to the error that occur which makes me to be unable to submit this answer, I've created a word document instead and the attached file can be found below.
Thanks!
Create a Python program that: Allows the user to enter a person's first name and last name. The user should be able to enter as many names as they desire. Create a function that takes the first name and last name, puts them together with the last name first, followed by the first name; with the names separated by commas. Take the result from the function, and place the resulting name in a list. Once the user finishes entering names, sort the contents of the list. Write the sorted names from a list into a text file. When you create the text file, allow the user to enter a name for the file to be created. After you finish writing names to the file, close the file and end the program.
Answer:
#main function start
def main():
#list to store names entered by user
name_list=[]
#variable to take input from user to keep rotating the loop and take input from user again and again
ch='y'
fname=""
lname=""
while ch=='y' or ch=='Y':#keep the loop taking input from user till user do not want to enter more
#take input from user
name=[]
fname=input("Enter first name: ")
lname=input("Enter last name: ")
name.append(fname)
name.append(lname)
#append the previously input first and last name in main list
name_list.append(name)
ch=input("Do you want to continue: (y/Y for yes)")
#main function end
#get file name from user
filename=input("Enter output file name")
#open file in write mode
file=open(filename,"w")
#keep loop add data in file till main list 'name_list' have
for i in name_list:
#Write data in file
file.write("%s, %s\r\n" % (i[0],i[1]))
#close the file
file.close()
#call main function
main()
Explanation:
input the above code and see output
Convert each of the following for loops into an equivalent while loop. (You might need to rename some variables for the code to compile, since all four parts a-d are in the same scope.)
// a.
System.out.println("a.");
int max = 5;
for (int n = 1; n <= max; n++) {
System.out.println(n);
}
System.out.println();
// b.
System.out.println("b.");
int total = 25;
for (int number = 1; number <= (total / 2); number++) {
total = total - number;
System.out.println(total + " " + number);
}
System.out.println();
// c.
System.out.println("c.");
for (int i = 1; i <= 2; i++) {
for (int j = 1; j <= 3; j++) {
for (int k = 1; k <= 4; k++) {
System.out.print("*");
}
System.out.print("!");
}
System.out.println();
}
System.out.println();
// d.
System.out.println("d.");
int number = 4;
for (int count = 1; count <= number; count++) {
System.out.println(number);
number = number / 2;
}
Answer:
~CaptnCoderYankee
Don't forget to award brainlyest if I got it right!
In which situations would it be most helpful to filter a form? Check all that apply.
Filtering is a useful way to see only the data that you want displayed in Access databases.
WRITTEN INTERVIEW QUESTIONS
Doctoral candidates should provide an authentic personal statement to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to response to each prompt/question individually for clarity of the reviewer. Writing sample should be submitted in Microsoft Word format and include candidate’s name.
PhD IT
1. Tell us about yourself and your personal journey that has lead you to University of the Cumberlands.
2. What are your research interests in the area of information technology? How did you become interested in this area of research?
3. What is your current job/career and how will this program impact your career growth?
4. What unique qualities do you think you have that will help you in being successful in this program?
5. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?
Explanation:
1. I grew up in a small community and my family owned a small business which involved manual labor. Although, having little income, my Dad sought to give us the best education he could afford from his little savings. With the small family savings I went to college where I studied Information Technology, after graduating I worked for a startup firm for two years before I decided to proceed with post graduate studies and I attained my Masters in UA. I met a friend who recommended I study in University of Cumberlands, I hesitated initially but was convinced after I researched the institution.
2. I'm particularly interested in the applications of information technology in labor intensive businesses and work because of my family background.
3. I have my own startup firm that designs work communication software for companies, however I intend to broaden my knowledge through this program into Information Technology based systems using machine learning algorithm.
4. I am committed to work and study, as some have called me a curious mind because of my passion towards learning.
5. I view obtaining a doctorate as not just a personal achievement but of lasting benefits to society as I use knowledge derived to improve the work experience of society.
I am confident that after my program I would be one the renowned contributors to the applications of information technology in labor intensive businesses.
Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, construct the heap data structure from the array A above. Represent your heap in the array A as well as using a binary tree. Clearly show all the steps c) Show how heap sort work in the heap you have constructed in part (b) above. Clearly show all the step in the heap sort
Answer:
Sorted Array A { } = { 1, 4, 23, 32, 34, 34, 67, 78, 89, 100 }
Explanation:
Binary tree is drawn given that the binary tree do not follow both minimum heap and maximum heap property, therefore, it is not a heap.
See attached picture.
Programming CRe-type the code and fix any errors. The code should convert non-positive numbers to 1.
if (userNum > 0)
printf("Positive.\n");
else
printf("Non-positive, converting to 1.\n");
user Num = 1;
printf("Final: %d\n", userNum);
1 #include Hem
int main(void) {
int userNum;
scanf("%d", &userNum);
return 0;
Answer:
Given
The above lines of code
Required
Rearrange.
The code is re-arrange d as follows;.
#include<iostream>
int main()
{
int userNum;
scanf("%d", &userNum);
if (userNum > 0)
{
printf("Positive.\n");
}
else
{
printf("Non-positive, converting to 1.\n");
userNum = 1;
printf("Final: %d\n", userNum);
}
return 0;
}
When rearranging lines of codes. one has to be mindful of the programming language, the syntax of the language and control structures in the code;
One should take note of the variable declarations and usage
See attachment for .cpp file
Pretend that your mother is a real estate agent and that she has decided to automate her daily tasks by using a laptop computer. Consider her potential hardware and software needs and create a hardware and software specification that describes them. The specification should be developed to help your mother buy her hardware and software on her own.
The specification should be developed to help your mother buy her hardware and software on her own is hardware.
Which is hardware?Hardware refers back to the computer's tangible additives or shipping structures that shop and run the written commands furnished through the software program. The software program is the intangible a part of the tool that shall we the consumer have interaction with the hardware and command it to carry out unique tasks.
A few automatic software programs could ship messages, alert and notifications to the customer in addition to the owner.The pc need to be of respectable potential and processing pace three. Video calling software program to have interaction with the clients. Softwares like Excel to keep the information and all An running gadget of right here convenience 4.320 to 500 GB difficult drive three.2.2 GHz of processor. Long battery life Software: three GB RAM.Read more about the hardware :
https://brainly.com/question/3273029
#SPJ2
Create a program that asks the user to enter grade scores. Use a loop to request each score and add it to a total. Continue accepting scores until the user enters a negative value. Finally, calculate and display the average for the entered scores.
Answer:
total = 0
count = 0
while(True):
grade = float(input("Enter a grade: "))
if grade < 0:
break
else:
total += grade
count += 1
average = total/count
print("The average is: " + str(average))
Explanation:
*The code is in Python.
Initialize the total and count as 0
Create a while loop that iterates until a specific condition is met inside the loop
Inside the loop, ask the user to enter a grade. If the grade is smaller than 0, stop the loop. Otherwise, add the grade to the total and increment the count by 1.
When the loop is done, calculate the average, divide the total by count, and print it
Charles Montesquieu believed that the
Legislative Branch should do what?
A. Make laws
B. Enforce laws
C. Interpret laws
elles sone. All Rights Resed.
Answer:
A. Make Laws
Explanation:
Montesquieu believed the ways to go about limiting the power of a monarch would be to split up power among 3 groups, Judicial, Legislative and Executive. The American Presidential system and Constitution used Montesquieu's writings as a foundation for their principles.
Judicial Interprets lawsLegislative Makes lawsExecutive Enforces LawPart 1: For this assignment, call it assign0 Implement the following library and driver program under assign0: Your library will be consisting of myio.h and myio.c. The function prototypes as well as more explanations are listed in myio.h. Please download it and accordingly implement the exported functions in myio.c. Basically, you are asked to develop a simple I/O library which exports a few functions to simplify the reading of an integer, a double, and more importantly a string (whole line). In contrast to standard I/O functions that can read strings (e.g., scanf with "%s", fgets) into a given static size buffer, your function should read the given input line of characters terminated by a newline character into a dynamically allocated and resized buffer based on the length of the given input line. Also your functions should check for possible errors (e.g., not an integer, not a double, illigal input, no memory etc.) and appropriately handle them. Then write a driver program driver.c that can simply use the functions from myio library. Specifically, your driver program should get four command-line arguments: x y z output_filename. It then prompts/reads x many integers, y many doubles, and z many lines, and prints them into a file called output_filename.txt. Possible errors should be printed on stderr.
myio.h file
/*
* File: myio.h
* Version: 1.0
* -----------------------------------------------------
* This interface provides access to a basic library of
* functions that simplify the reading of input data.
*/
#ifndef _myio_h
#define _myio_h
/*
* Function: ReadInteger
* Usage: i = ReadInteger();
* ------------------------
* ReadInteger reads a line of text from standard input and scans
* it as an integer. The integer value is returned. If an
* integer cannot be scanned or if more characters follow the
* number, the user is given a chance to retry.
*/
int ReadInteger(void);
/*
* Function: ReadDouble
* Usage: x = ReadDouble();
* ---------------------
* ReadDouble reads a line of text from standard input and scans
* it as a double. If the number cannot be scanned or if extra
* characters follow after the number ends, the user is given
* a chance to reenter the value.
*/
double ReadDouble(void);
/*
* Function: ReadLine
* Usage: s = ReadLine();
* ---------------------
* ReadLine reads a line of text from standard input and returns
* the line as a string. The newline character that terminates
* the input is not stored as part of the string.
*/
char *ReadLine(void);
/*
* Function: ReadLine
* Usage: s = ReadLine(infile);
* ----------------------------
* ReadLineFile reads a line of text from the input file and
* returns the line as a string. The newline character
* that terminates the input is not stored as part of the
* string. The ReadLine function returns NULL if infile
* is at the end-of-file position. Actually, above ReadLine();
* can simply be implemented as return(ReadLineFile(stdin)); */
char *ReadLineFile(FILE *infile);
#endif
Answer:
Explanation:
PROGRAM
main.c
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <unistd.h>
#include "myio.h"
int checkInt(char *arg);
int main(int argc, char *argv[]) {
int doubles, i, ints, lines;
char newline;
FILE *out;
int x, y, z;
newline = '\n';
if (argc != 5) {
printf("Usage is x y z output_filename\n");
return 0;
}
if (checkInt(argv[1]) != 0)
return 0;
ints = atoi(argv[1]);
if (checkInt(argv[2]) != 0)
return 0;
doubles = atoi(argv[2]);
if (checkInt(argv[3]) != 0)
return 0;
lines = atoi(argv[3]);
out = fopen(argv[4], "a");
if (out == NULL) {
perror("File could not be opened");
return 0;
}
for (x = 0; x < ints; x++) {
int n = ReadInteger();
printf("%d\n", n);
fprintf(out, "%d\n", n);
}
for (y = 0; y < doubles; y++) {
double d = ReadDouble();
printf("%lf\n", d);
fprintf(out, "%lf\n", d);
}
for (z = 0; z < lines; z++) {
char *l = ReadLine();
printf("%s\n", l);
fprintf(out, "%s\n", l);
free(l);
}
fclose(out);
return 0;
}
int checkInt(char *arg) {
int x;
x = 0;
while (arg[x] != '\0') {
if (arg[x] > '9' || arg[x] < '0') {
printf("Improper input. x, y, and z must be ints.\n");
return -1;
}
x++;
}
return 0;
}
myio.c
#include <limits.h>
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
char *ReadInput(int fd) {
char buf[BUFSIZ];
int i;
char *input;
int r, ret, x;
i = 1;
r = 0;
ret = 1;
input = calloc(BUFSIZ, sizeof(char));
while (ret > 0) {
ret = read(fd, &buf, BUFSIZ);
for (x = 0; x < BUFSIZ; x++) {
if (buf[x] == '\n' || buf[x] == EOF) {
ret = -1;
break;
}
input[x*i] = buf[x];
r++;
}
i++;
if (ret != -1)
input = realloc(input, BUFSIZ*i);
}
if (r == 0)
return NULL;
input[r] = '\0';
input = realloc(input, r+1);
return(input);
}
int ReadInteger() {
char *input;
int go, num, x;
go = 0;
do {
go = 0;
printf("Input an integer\n");
input = ReadInput(STDIN_FILENO);
for (x = 0; x < INT_MAX; x++) {
if (x == 0&& input[x] == '-')
continue;
if (input[x] == 0)
break;
else if (input[x]> '9' || input[x] < '0') {
go = 1;
printf("Improper input\n");
break;
}
}
} while (go == 1);
num = atoi(input);
free(input);
return num;
}
double ReadDouble(void) {
int dec, exp;
char *input;
int go;
double num;
int x;
do {
go = 0;
dec = 0;
exp = 0;
printf("Input a double\n");
input = ReadInput(STDIN_FILENO);
for (x = 0; x < INT_MAX; x++) {
if (x == 0&& input[x] == '-')
continue;
if (input[x] == 0)
break;
else if (input[x] == '.' && dec == 0)
dec = 1;
else if (x != 0&& (input[x] == 'e' || input[x] == 'E') && exp == 0) {
dec = 1;
exp = 1;
}
else if (input[x]> '9' || input[x] < '0') {
go = 1;
printf("Improper input\n");
break;
}
}
} while (go == 1);
num = strtod(input, NULL);
free(input);
return num;
}
char *ReadLine(void) {
printf("Input a line\n");
return(ReadInput(STDIN_FILENO));
}
char *ReadLineFile(FILE *infile) {
int fd;
fd = fileno(infile);
return(ReadInput(fd));
}
myio.h
#ifndef _myio_h
#define _myio_h
/*
* Function: ReadInteger
* Usage: i = ReadInteger();
* ------------------------
* ReadInteger reads a line of text from standard input and scans
* it as an integer. The integer value is returned. If an
* integer cannot be scanned or if more characters follow the
* number, the user is given a chance to retry.
*/
int ReadInteger(void);
/*
* Function: ReadDouble
* Usage: x = ReadDouble();
* ---------------------
* ReadDouble reads a line of text from standard input and scans
* it as a double. If the number cannot be scanned or if extra
* characters follow after the number ends, the user is given
* a chance to reenter the value.
*/
double ReadDouble(void);
/*
* Function: ReadLine
* Usage: s = ReadLine();
* ---------------------
* ReadLine reads a line of text from standard input and returns
* the line as a string. The newline character that terminates
* the input is not stored as part of the string.
*/
char *ReadLine(void);
/*
* Function: ReadLine
* Usage: s = ReadLine(infile);
* ----------------------------
* ReadLineFile reads a line of text from the input file and
* returns the line as a string. The newline character
* that terminates the input is not stored as part of the
* string. The ReadLine function returns NULL if infile
* is at the end-of-file position. Actually, above ReadLine();
* can simply be implemented as return(ReadLineFile(stdin)); */
char *ReadLineFile(FILE *infile);
You are working at the Acme company that has the following environment: 400 Windows Servers 2. 8000 Windows client devices (laptops running Windows os) 40 Linux servers Active Directory Domain Services to provide dns services to all the hosts, both Windows and Linux. Acme acquires a small research company, Uni-Tech that uses Unix servers for all of its applications. For host resolution they use BIND
a. Describe what BIND is and what the acronym stands for? BIND stands for Berkley Internet Name Domain. BIND allows you to pick one of your computers to act as the DNS server.
b. This acquisition happens very quickly and on day one the business needs people at Uni-Tech to connect to hosts at Acme using hosts names that can be resolved by Active Directory. Describe a method for integrating the two environments that does not require too many individual tasks that will take many hours. (10) Describe how you would test to make sure your integration is working correctly.
Answer: Provided in the explanation section
Explanation:
(a). BIND is a type of DNS server used on the internet, actually it is reported to be most widely used DNS server on the internet. Also BIND is the de-facto standard on Unix like operating systems and Linux. Thus it can be used to locate computers on a network using domain names instead of their IP addresses. BIND was originally programmed at the University of California, Berkeley in the 1980s, this was made possible by a grant from US based DARPA program.
Originally, BIND stood for Berkeley Internet name daemon, but nowadays it is called Berkeley Internet name domain.
(b). In some of the clients in windows and Windows servers we will install LDP. By the LDP.exe we can test tDNS, Active directory woking , even we can add or modify. LDP is used to test and verify the Active Directory objects. We will install in windows machine then open the software, then from the menu we will select connect and type the IP adress of the Active Directory then we will select or type the objects of Active directory. For Linux system we have to openldap and can search the AD.
From Linux or Unix we can use the nmap tool which can test the network connectivity between all the computers whether it is windows or Linux. By nmap we can test by ICMP protocol to verify the network connectivity. By nmap we can scan all the port which are required to open from client to the server. We can also use nslookup to test DNS server from the client. By nslookup we can check that client can connect the server.
For this project, you have to write 3 functions. C++
1. remove_adjacent_digits. This takes in 2 arguments, a std::vector, and a std::vector of the same size. You need to return a std::vector, where each of the strings no longer has any digits that are equal to, one more, or one less, than the corresponding integer in the 2nd vector.
2. sort_by_internal_numbers. This takes in a single argument, a std::vector, and you need to return a std::vector, which is sorted as if only the digits of each string is used to make a number.
3. sort_by_length_2nd_last_digit. This takes in a std::vector>. It returns a vector of the same type as the input, which is sorted, first by the length of the string in the pair, and if they are the same length, then the second last digit of the int.
See the test cases for examples of each of the above functions.
You need to submit a single file called main.cpp that contains all these functions. You can (and should) write additional functions as well. There is no need for a main function.
No loops (for, while, etc) are allowed. You must use only STL algorithms for this project.
Find the given attachments
Python high school assignment: please keep simpleIn pythonInstructionsUse the following initializer list:w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]Write a loop that prints the words in uppercase letters.Sample RunALGORITHMLOGICFILTERSOFTWARENETWORKPARAMETERSANALYZEALGORITHMFUNCTIONALITYVIRUSES
Answer:
w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]
for i in range (len(w)):
print(w[i].upper())
Explanation:
every element needs to be upper cased
A loop that prints the words in uppercase letters is written below with the help of Python.
What is a function?Simply said, a function is a "chunk" of code that you may reuse repeatedly so instead of having to write it out several times. Software developers can divide an issue into smaller, more manageable parts, which can each carry out a specific task, using functions.
A function, according to a technical definition, is a relationship between an amount of parameters and a set of potential outputs, where every other input is connected to precisely one output.
All the functions are to be written in uppercase:
w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]
for i in range (len(w)):
print(w[i].upper())
Learn more about function, Here:
https://brainly.com/question/29050409
#SPJ5