For this assignment, you will create flowchart using Flow gorithm and Pseudocode for the following program example: Hunter Cell Phone Company charges customer's a basic rate of $5 per month to send text messages. Additional rates apply as such:The first 60 messages per month are included in the basic billAn additional 10 cents is charged for each text message after the 60th message and up to 200 messages.An additional 25 cents is charged for each text after the 200th messageFederal, state, and local taxes add a total of 12% to each billThe company wants a program that will accept customer's name and the number of text messages sent. The program should display the customer's name and the total end of the month bill before and after taxes are added.

Answers

Answer 1

Answer:

The pseudocode is as given below while the flowchart is attached.

Explanation:

The pseudocode is as follows

input customer name, number of texts  

Set Basic bill=5 $;

if the number of texts is less than or equal to 60

Extra Charge=0;

If the number of texts is greater than 60 and less than 200

number of texts b/w 60 and 200 =number of texts-60;

Extra Charge=0.1*(number of texts b/w 60 and 200);

else If the number of texts is greater than 200

number of texts beyond 200 =number of texts-200;

Extra Charge=0.25*(number of texts beyond 200)+0.1*(200-60);

Display Customer Name

Total Bill=Basic bill+Extra Charge;

Total Bill after Tax=Total Bill*1.12;

For This Assignment, You Will Create Flowchart Using Flow Gorithm And Pseudocode For The Following Program

Related Questions

Using MARS/MIPS
A) Write a program which increments from 0 to 15 and display results in Decimal on the console
B) Modify above program to increment from 0 to 15 and display results in Hexadecimal on the console

Answers

Answer:

Explanation:

MIPS program which increments from 0 to 15 and display results in Decimal on the console

In this program the user defined procedures print_int and print_eot were used to print the integer values and new line characters(\n) respectively.the mechanisam of the loop is explaine in the comment section of the program.

     addi $s0, $0, 0

     addi $s1, $0, 15

print_int:

              li $v0, 1                # system call to print integer

              syscall                

              jr $ra                     # return

print_eol:                      # prints "\n"

            li $v0, 4            

              la $a0, linebrk      

              syscall              

              jr $ra                  # return

main: . . .          

              li $a0, 0                # print 0

              jal print_int         # print value in $a0

loop:   move $a0, $s0           # print loop count

       jal print_int        

       jal print_eol           # print "\n" character

       addi $s0, $s0, 1        # increment loop count by 1

       ble $s1, $s0, loop      # exit if $s1<$s0

beq $s0, $0, end

end:

MIPS progam to increment from 0 to 15 and display results in Hexadecimal on the console

this program is slightly differed from the previous program in this program the system call issued in print_int is implemented with a system call that prints numbers in hex.

addi $s0, $0, 15

     addi $s1, $0, 0

print_int:

   li      $v0,34                  # syscall number for "print hex"

   syscall                         # issue the syscall

              jr $ra                     # return

print_eol:                      # prints "\n"

            li $v0, 4            

              la $a0, linebrk      

              syscall              

              jr $ra                  # return

main: . . .          

              li $a0, 0                # print 0

              jal print_int         # print value in $a0

loop:   move $a0, $s0           # print loop count

       jal print_int        

       jal print_eol           # print "\n" character

       addi $s0, $s0, 1        # increment loop count by 1

       ble $s1, $s0, loop      # exit if $s0>$s1

beq $s0, $0, end

end:

Consider the following skeletal C-like program:
void fun1(void); /* prototype */
void fun2(void); /* prototype */
void fun3(void); /* prototype */
void main() {
int a, b, c;
. . .
}
void fun1(void) {
int b, c, d;
. . .
}
void fun2(void) {
int c, d, e;
. . .
}
void fun3(void) {
int d, e, f;
. . .
}
Given the following calling sequences and assuming that dynamic scoping is used, what variables are visible during execution of the last function called? Include with each visible variable the name of the function in which it was defined
a. main calls funl; funl calls fun2; fun2 calls fun3
b. main calls fun1; fun1 calls fun3
c. main calls fun2; fun2 calls fun3; fun3 calls funl
d. main calls fun1; funl calls fun3; fun3 calls fun2.

Answers

Answer:

In dynamic scoping the current block is searched by the compiler and then all calling functions consecutively e.g. if a function a() calls a separately defined function b() then b() does have access to the local variables of a(). The visible variables with the name of the function in which it was defined are given below.

Explanation:

a. main calls fun1; fun1 calls fun2; fun2 calls fun3

Solution:

Visible Variable:  d, e, f         Defined in: fun3Visible Variable: c                  Defined in: fun2 ( the variables d and e of fun2 are not visible)Visible Variable: b                  Defined in: fun1 ( c and d of func1 are hidden)Visible Variable: a                  Defined in: main (b,c are hidden)

b. main calls fun1; fun1 calls fun3

Solution:

Visible Variable:  d, e, f          Defined in: fun3 Visible Variable:  b, c              Defined in: fun1 (d not visible)Visible Variable:  a                 Defined in: main ( b and c not visible)

c. main calls fun2; fun2 calls fun3; fun3 calls fun1

Solution:

Visible Variable:  b, c, d         Defined in: fun1 Visible Variable:  e, f              Defined in: fun3 ( d not visible)Visible Variable:  a                 Defined in: main ( b and c not visible)

Here variables c, d and e of fun2 are not visible .

d. main calls fun1; fun1 calls fun3; fun3 calls fun2

Solution:

Visible Variable: c, d, e        Defined in: fun2Visible Variable:  f                Defined in: fun3 ( d and e not visible)Visible Variable:  b              Defined in: fun1 ( c and d not visible)Visible Variable: a                Defined in: main ( b and c not visible)

The following numbers are inserted into a linked list in this order:
10, 20, 30, 40, 50, 60
What would the following statements display?
pCur = head->next;
cout << pCur->data << " ";
cout << pCur->next->data << endl;
a) 20 30
b) 40 50
c) 10 20
d) 30 40

Answers

Answer:

A. 20 30

Explanation:

Given

Linked list: 10, 20, 30, 40, 50, 60

Required

The output of the following code segment

pCur = head->next;

cout << pCur->data << " ";

cout << pCur->next->data << endl;

A linked list operates by the use of nodes which begins from the head to the next node, to the next, till it reaches the last;

The first line of the code segment; "pCur = head->next; " shifts the node from the head to the next node

The head node is the node at index 0 and that is 10;

This means that the focus has been shifted to the next at index 1 and that is 20;

So, pCur = 20

The next line of the code segment; cout << pCur->data << " "; prints pCur and a blank space

i.e. "20 " [Take note of the blank space after 20]

The last line "cout << pCur->next->data << endl; " contains two instructions which are

1. pCur = next->data;

2. cout<<pCur->data;

(1) shifts focus to the next node after 20 ; This gives pCur = 30

(2) prints the value of pCur

Hence, the output of the code segment is 20 30

WRITTEN INTERVIEW QUESTIONS
Doctoral candidates should provide an authentic personal statement to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to response to each prompt/question individually for clarity of the reviewer. Writing sample should be submitted in Microsoft Word format and include candidate’s name.
PhD IT
1. Tell us about yourself and your personal journey that has lead you to University of the Cumberlands.
2. What are your research interests in the area of information technology? How did you become interested in this area of research?
3. What is your current job/career and how will this program impact your career growth?
4. What unique qualities do you think you have that will help you in being successful in this program?
5. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?

Answers

Explanation:

1. I grew up in a small community and my family owned a small business which involved manual labor. Although, having little income, my Dad sought to give us the best education he could afford from his little savings. With the small family savings I went to college where I studied Information Technology, after graduating I worked for a startup firm for two years before I decided to proceed with post graduate studies and I attained my Masters in UA. I met a friend who recommended I study in University of Cumberlands, I hesitated initially but was convinced after I researched the institution.

2. I'm particularly interested in the applications of information technology in labor intensive businesses and work because of my family background.

3. I have my own startup firm that designs work communication software for companies, however I intend to broaden my knowledge through this program into Information Technology based systems using machine learning algorithm.

4. I am committed to work and study, as some have called me a curious mind because of my passion towards learning.

5. I view obtaining a doctorate as not just a personal achievement but of lasting benefits to society as I use knowledge derived to improve the work experience of society.

I am confident that after my program I would be one the renowned contributors to the applications of information technology in labor intensive businesses.

Python high school assignment: please keep simpleIn pythonInstructionsUse the following initializer list:w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]Write a loop that prints the words in uppercase letters.Sample RunALGORITHMLOGICFILTERSOFTWARENETWORKPARAMETERSANALYZEALGORITHMFUNCTIONALITYVIRUSES

Answers

Answer:

w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]

for i in range (len(w)):

   print(w[i].upper())

Explanation:

every element needs to be upper cased

A loop that prints the words in uppercase letters is written below with the help of Python.

What is a function?

Simply said, a function is a "chunk" of code that you may reuse repeatedly so instead of having to write it out several times. Software developers can divide an issue into smaller, more manageable parts, which can each carry out a specific task, using functions.

A function, according to a technical definition, is a relationship between an amount of parameters and a set of potential outputs, where every other input is connected to precisely one output.

All the functions are to be written in uppercase:

w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]

for i in range (len(w)):

  print(w[i].upper())

Learn more about function, Here:

https://brainly.com/question/29050409

#SPJ5

What program is best for teaching young people code?

Answers

I’d probably say scratch, Its great for young people to learn how to code. Lots of things you can do and make with it.

You are writing a paragraph in a word processor. You
want to use the same text that appears elsewhere in a
different document, but you want to keep it in the other
document. To get the other text into the new document
most efficiently, you should:
Cut and paste
Ctrl + S
Copy and paste
Print the text and retype it so you don't make any mistakes.

Answers

Answer:

Explanation:

I mean I would copy and paste it. I hope thats right

What is a digital security risks?

Answers

Answer:

A digital security risk is an action that could result in damage to a computer or similar device's hardware, software, data etc.

Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, construct the heap data structure from the array A above. Represent your heap in the array A as well as using a binary tree. Clearly show all the steps c) Show how heap sort work in the heap you have constructed in part (b) above. Clearly show all the step in the heap sort

Answers

Answer:

Sorted Array A { } = { 1, 4, 23, 32, 34, 34, 67, 78, 89, 100 }

Explanation:

Binary tree is drawn given that the binary tree do not follow both minimum heap and maximum heap property, therefore, it is not a heap.

See attached picture.

Convert each of the following for loops into an equivalent while loop. (You might need to rename some variables for the code to compile, since all four parts a-d are in the same scope.)

// a.

System.out.println("a.");
int max = 5;
for (int n = 1; n <= max; n++) {

System.out.println(n);

}

System.out.println();

// b.

System.out.println("b.");

int total = 25;

for (int number = 1; number <= (total / 2); number++) {

total = total - number;

System.out.println(total + " " + number);

}

System.out.println();

// c.

System.out.println("c.");

for (int i = 1; i <= 2; i++) {

for (int j = 1; j <= 3; j++) {

for (int k = 1; k <= 4; k++) {

System.out.print("*");

}

System.out.print("!");

}

System.out.println();

}

System.out.println();

// d.

System.out.println("d.");

int number = 4;

for (int count = 1; count <= number; count++) {

System.out.println(number);

number = number / 2;

}

Answers

Answer:

~CaptnCoderYankee

Don't forget to award brainlyest if I got it right!

A(n) ________ is a server-based operating system oriented to computer networking and may include directory services, network management, network monitoring, network policies, user group management, network security, and other network-related functions.

Answers

Answer:

Network Operating System (NOS)

Explanation:

A network operating system (NOS) is an operating system that makes different computer devices connect to a common network in order to communicate and share resources with each other using a server. A network operating system can be used by printers, computers, file sever among others, and they are connected together using a local area network. This local area network which they are connected to works as the server.

The NOS also acts as a network security because it could be used as an access control or even user authentication.

There are two types of NOS

1) Peer to peer network operating system.

2) Client/server network operating system

A network operating system (NOS) is a server-based operating system oriented to computer networking and may include directory services, network management, network monitoring, network policies, user group management, network security, and other network-related functions.

Charles Montesquieu believed that the
Legislative Branch should do what?
A. Make laws
B. Enforce laws
C. Interpret laws
elles sone. All Rights Resed.​

Answers

Answer:

A. Make Laws

Explanation:

Montesquieu believed the ways to go about limiting the power of a monarch would be to split up power among 3 groups, Judicial, Legislative and Executive. The American Presidential system and Constitution used Montesquieu's writings as a foundation for their principles.

Judicial Interprets lawsLegislative Makes lawsExecutive Enforces Law

A. make laws ........ sorry for all the dots have to make it longer :/

Compute -ABE16-DF416 using 15’s complement

Answers

Answer:

33600

Explanation:

Let M = ABE16

and N = DF416

In hexadecimal representation: 10 = A, 11 = B, 12 = C, 13 = D, 14 = E, 15 = F

Step 1: Find the 15's complement of N

 F  F  F  F  F

- D  F  4  1  6

2  0  B  E  9

Step 2: Add 15's complement of N to M

  A  B  E  1  6

+ 2  0  B  E  9  

  C  C  9  F  F

Step 3: Find the 15's complement of CC9FF

 F  F   F  F  F

- C  C  9  F  F

 3   3  6  0  0

Therefore, ABE16 - DF416 using 15's complement is 33600

Programming CRe-type the code and fix any errors. The code should convert non-positive numbers to 1.
if (userNum > 0)
printf("Positive.\n");
else
printf("Non-positive, converting to 1.\n");
user Num = 1;
printf("Final: %d\n", userNum);
1 #include Hem
int main(void) {
int userNum;
scanf("%d", &userNum);
return 0;

Answers

Answer:

Given

The above lines of code

Required

Rearrange.

The code is re-arrange d as follows;.

#include<iostream>

int main()

{

int userNum;

scanf("%d", &userNum);

if (userNum > 0)

{

printf("Positive.\n");

}

else

{

printf("Non-positive, converting to 1.\n");

userNum = 1;

printf("Final: %d\n", userNum);

}

return 0;

}

When rearranging lines of codes. one has to be mindful of the programming language, the syntax of the language and control structures in the code;

One should take note of the variable declarations and usage

See attachment for .cpp file

Write a program that reads a list of words. Then, the program outputs those words and their frequencies. Ex: If the input is: hey hi Mark hi mark the output is: hey 1 hi 2 Mark 1 hi 2 mark 1

Answers

Answer:

#Declare variable to get the input

#list from the user

input_list = input()

#split the list into words by space

list = input_list.split()

#Begin for-loop to iterate each word

#to get the word frequency

for word in list:

#get the frequency for each word

frequency=list.count(word)

#print word and frequency

print(word,frequency)

Explanation:

This program that we are told to write will be done by using python programming language/ High-level programming language.

The question wants us to write a program in which the output will be as below;

hey 1

hi 2

Mark 1

hi 2

mark 1

Just by imputing hey hi mark hi mark.

Just copy and run the code below.

#Declare variable to get the input

#list from the user

input_list = input()

#split the list into words by space

list = input_list.split()

#Begin for-loop to iterate each word

#to get the word frequency

for word in list:

#get the frequency for each word

frequency=list.count(word)

#print word and frequency

print(word,frequency)

In this exercise we have to use the knowledge in computational language in python to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is

input_list = input()

list = input_list.split()

for word in list:

frequency=list.count(word)

print(word,frequency)

See more about python at brainly.com/question/18502436

Part 1: For this assignment, call it assign0 Implement the following library and driver program under assign0: Your library will be consisting of myio.h and myio.c. The function prototypes as well as more explanations are listed in myio.h. Please download it and accordingly implement the exported functions in myio.c. Basically, you are asked to develop a simple I/O library which exports a few functions to simplify the reading of an integer, a double, and more importantly a string (whole line). In contrast to standard I/O functions that can read strings (e.g., scanf with "%s", fgets) into a given static size buffer, your function should read the given input line of characters terminated by a newline character into a dynamically allocated and resized buffer based on the length of the given input line. Also your functions should check for possible errors (e.g., not an integer, not a double, illigal input, no memory etc.) and appropriately handle them. Then write a driver program driver.c that can simply use the functions from myio library. Specifically, your driver program should get four command-line arguments: x y z output_filename. It then prompts/reads x many integers, y many doubles, and z many lines, and prints them into a file called output_filename.txt. Possible errors should be printed on stderr.

myio.h file

/*
* File: myio.h
* Version: 1.0
* -----------------------------------------------------
* This interface provides access to a basic library of
* functions that simplify the reading of input data.
*/

#ifndef _myio_h
#define _myio_h

/*
* Function: ReadInteger
* Usage: i = ReadInteger();
* ------------------------
* ReadInteger reads a line of text from standard input and scans
* it as an integer. The integer value is returned. If an
* integer cannot be scanned or if more characters follow the
* number, the user is given a chance to retry.
*/

int ReadInteger(void);

/*
* Function: ReadDouble
* Usage: x = ReadDouble();
* ---------------------
* ReadDouble reads a line of text from standard input and scans
* it as a double. If the number cannot be scanned or if extra
* characters follow after the number ends, the user is given
* a chance to reenter the value.
*/

double ReadDouble(void);

/*
* Function: ReadLine
* Usage: s = ReadLine();
* ---------------------
* ReadLine reads a line of text from standard input and returns
* the line as a string. The newline character that terminates
* the input is not stored as part of the string.
*/

char *ReadLine(void);

/*
* Function: ReadLine
* Usage: s = ReadLine(infile);
* ----------------------------
* ReadLineFile reads a line of text from the input file and
* returns the line as a string. The newline character
* that terminates the input is not stored as part of the
* string. The ReadLine function returns NULL if infile
* is at the end-of-file position. Actually, above ReadLine();
* can simply be implemented as return(ReadLineFile(stdin)); */

char *ReadLineFile(FILE *infile);

#endif

Answers

Answer:

Explanation:

PROGRAM

main.c

#include <fcntl.h>

#include <stdio.h>

#include <stdlib.h>

#include <sys/stat.h>

#include <sys/types.h>

#include <unistd.h>

#include "myio.h"

int checkInt(char *arg);

int main(int argc, char *argv[]) {

  int doubles, i, ints, lines;

  char newline;

  FILE *out;

  int x, y, z;

  newline = '\n';

  if (argc != 5) {

     printf("Usage is x y z output_filename\n");

     return 0;

  }

  if (checkInt(argv[1]) != 0)

     return 0;

  ints = atoi(argv[1]);

  if (checkInt(argv[2]) != 0)

     return 0;

  doubles = atoi(argv[2]);

  if (checkInt(argv[3]) != 0)

     return 0;

  lines = atoi(argv[3]);

  out = fopen(argv[4], "a");

  if (out == NULL) {

     perror("File could not be opened");

     return 0;

  }

  for (x = 0; x < ints; x++) {

     int n = ReadInteger();

     printf("%d\n", n);

     fprintf(out, "%d\n", n);

  }

  for (y = 0; y < doubles; y++) {

     double d = ReadDouble();

     printf("%lf\n", d);

     fprintf(out, "%lf\n", d);

  }

  for (z = 0; z < lines; z++) {

     char *l = ReadLine();

     printf("%s\n", l);

     fprintf(out, "%s\n", l);

     free(l);

  }

  fclose(out);

  return 0;

}

int checkInt(char *arg) {

  int x;

  x = 0;

  while (arg[x] != '\0') {

     if (arg[x] > '9' || arg[x] < '0') {

        printf("Improper input. x, y, and z must be ints.\n");

        return -1;

     }

     x++;

  }

  return 0;

}

myio.c

#include <limits.h>

#include <stdio.h>

#include <stdlib.h>

#include <unistd.h>

char *ReadInput(int fd) {

  char buf[BUFSIZ];

  int i;

  char *input;

  int r, ret, x;

  i = 1;

  r = 0;

  ret = 1;

  input = calloc(BUFSIZ, sizeof(char));

  while (ret > 0) {

     ret = read(fd, &buf, BUFSIZ);

   

     for (x = 0; x < BUFSIZ; x++) {

        if (buf[x] == '\n' || buf[x] == EOF) {

           ret = -1;

           break;

        }

        input[x*i] = buf[x];

        r++;

     }

   

     i++;

   

     if (ret != -1)

        input = realloc(input, BUFSIZ*i);

  }

  if (r == 0)

     return NULL;

  input[r] = '\0';

  input = realloc(input, r+1);

  return(input);

}

int ReadInteger() {

  char *input;

  int go, num, x;

  go = 0;

  do {

     go = 0;

   

     printf("Input an integer\n");

     input = ReadInput(STDIN_FILENO);

     for (x = 0; x < INT_MAX; x++) {

        if (x == 0&& input[x] == '-')

           continue;

        if (input[x] == 0)

           break;

        else if (input[x]> '9' || input[x] < '0') {

           go = 1;

           printf("Improper input\n");

           break;

        }

    }

  } while (go == 1);

  num = atoi(input);

  free(input);

  return num;

}

double ReadDouble(void) {

  int dec, exp;

  char *input;

  int go;

  double num;

  int x;

  do {

     go = 0;

     dec = 0;

     exp = 0;

   

     printf("Input a double\n");

     input = ReadInput(STDIN_FILENO);

     for (x = 0; x < INT_MAX; x++) {

        if (x == 0&& input[x] == '-')

           continue;

        if (input[x] == 0)

           break;

        else if (input[x] == '.' && dec == 0)

           dec = 1;

        else if (x != 0&& (input[x] == 'e' || input[x] == 'E') && exp == 0) {

           dec = 1;

           exp = 1;

        }

        else if (input[x]> '9' || input[x] < '0') {

           go = 1;

           printf("Improper input\n");

           break;

        }

     }

  } while (go == 1);

  num = strtod(input, NULL);

  free(input);

  return num;

}

char *ReadLine(void) {

  printf("Input a line\n");

  return(ReadInput(STDIN_FILENO));

}

char *ReadLineFile(FILE *infile) {

  int fd;

  fd = fileno(infile);

  return(ReadInput(fd));

}

myio.h

#ifndef _myio_h

#define _myio_h

/*

* Function: ReadInteger

* Usage: i = ReadInteger();

* ------------------------

* ReadInteger reads a line of text from standard input and scans

* it as an integer. The integer value is returned. If an

* integer cannot be scanned or if more characters follow the

* number, the user is given a chance to retry.

*/

int ReadInteger(void);

/*

* Function: ReadDouble

* Usage: x = ReadDouble();

* ---------------------

* ReadDouble reads a line of text from standard input and scans

* it as a double. If the number cannot be scanned or if extra

* characters follow after the number ends, the user is given

* a chance to reenter the value.

*/

double ReadDouble(void);

/*

* Function: ReadLine

* Usage: s = ReadLine();

* ---------------------

* ReadLine reads a line of text from standard input and returns

* the line as a string. The newline character that terminates

* the input is not stored as part of the string.

*/

char *ReadLine(void);

/*

* Function: ReadLine

* Usage: s = ReadLine(infile);

* ----------------------------

* ReadLineFile reads a line of text from the input file and

* returns the line as a string. The newline character

* that terminates the input is not stored as part of the

* string. The ReadLine function returns NULL if infile

* is at the end-of-file position. Actually, above ReadLine();

* can simply be implemented as return(ReadLineFile(stdin)); */

char *ReadLineFile(FILE *infile);

write the following function so that it returns the same result, but does

not increment the variable ptr. Your new program must not use anysquare brackets, but must use an integer variable to visit each double in the array. You may eliminate any unneeded variable.

double computeAverage(const double* scores, int nScores)

{
const double* ptr = scores;
double tot = 0;
while (ptr != scores + nScores)

{
tot += *ptr; } ptr++;

}
return tot/nScores;

b. Rewrite the following function so that it does not use any square brackets (not even in the parameter declarations) but does use the integervariable k. Do not use any of the functions such as strlen, strcpy, etc.

// This function searches through str for the character chr.
// If the chr is found, it returns a pointer into str where
// the character was first found, otherwise nullptr (not found).

const char* findTheChar(const char str[], char chr)

{
for(intk=0;str[k]!=0;k++)
if (str[k] == chr)

}

return &str[k];
return nullptr;
}

c. Now rewrite the function shown in part b so that it uses neither square brackets nor any integer variables. Your new function must not use any local variables other than the parameters.

Answers

Answer:

Explanation:

a.  

// Rewriting the given function without using any square brackets

double computeAverage(const double* scores, int nScores)

{

const double* ptr = scores;

double tot = 0;

int i;//declaring integer variable

for(i=0;i<nScores;i++)

{

//using an integer variable i to visit each double in the array

tot += *(ptr+i);

}

return tot/nScores;

}

b.

// Rewriting the given function without using any square brackets

const char* findTheChar(const char* str, char chr)

{

for(int k=0;(*(str+k))!='\0';k++)

{

if ((*(str+k)) == chr)

return (str+k);

}

return nullptr;

}

c.

//Now rewriting the function shown in part b so that it uses neither square brackets nor any integer variables

const char* findTheChar(const char* str, char chr)

{

while((*str)!='\0')

{

if ((*str) == chr)

return (str);

str++;

}

return nullptr;

}

random integer between 3 and 13 (inclusive)

Answers

Answer:

6

Explanation:

Answer:

4

Explanation:

It is between 3 and 13. Please answer some of my questions too! :)

Create a Python program that: Allows the user to enter a person's first name and last name. The user should be able to enter as many names as they desire. Create a function that takes the first name and last name, puts them together with the last name first, followed by the first name; with the names separated by commas. Take the result from the function, and place the resulting name in a list. Once the user finishes entering names, sort the contents of the list. Write the sorted names from a list into a text file. When you create the text file, allow the user to enter a name for the file to be created. After you finish writing names to the file, close the file and end the program.

Answers

Answer:

#main function start

def main():

#list to store names entered by user

name_list=[]

#variable to take input from user to keep rotating the loop and take input from user again and again

ch='y'

fname=""

lname=""

while ch=='y' or ch=='Y':#keep the loop taking input from user till user do not want to enter more

#take input from user

name=[]

fname=input("Enter first name: ")

lname=input("Enter last name: ")

name.append(fname)

name.append(lname)

 

#append the previously input first and last name in main list

name_list.append(name)

ch=input("Do you want to continue: (y/Y for yes)")

#main function end

#get file name from user

filename=input("Enter output file name")

#open file in write mode

file=open(filename,"w")

#keep loop add data in file till main list 'name_list' have

for i in name_list:

#Write data in file

file.write("%s, %s\r\n" % (i[0],i[1]))

#close the file

file.close()

#call main function

main()

Explanation:

input the above code and see output

For this project, you have to write 3 functions. C++

1. remove_adjacent_digits. This takes in 2 arguments, a std::vector, and a std::vector of the same size. You need to return a std::vector, where each of the strings no longer has any digits that are equal to, one more, or one less, than the corresponding integer in the 2nd vector.

2. sort_by_internal_numbers. This takes in a single argument, a std::vector, and you need to return a std::vector, which is sorted as if only the digits of each string is used to make a number.

3. sort_by_length_2nd_last_digit. This takes in a std::vector>. It returns a vector of the same type as the input, which is sorted, first by the length of the string in the pair, and if they are the same length, then the second last digit of the int.

See the test cases for examples of each of the above functions.

You need to submit a single file called main.cpp that contains all these functions. You can (and should) write additional functions as well. There is no need for a main function.

No loops (for, while, etc) are allowed. You must use only STL algorithms for this project.

Answers

Find the given attachments

A number of LC-3 instructions have an "evaluate address" step in the instruction cycle, in which a 16-bit address is constructed and written to the Memory Address Register via the MARMUX. List all LC-3 instructions that write to the MAR during the evaluate address phase of the instruction cycle, with the Register Transfer description of each.

Answers

Answer: you want to list all LC structers

Explanation:

Create a program that asks the user to enter grade scores. Use a loop to request each score and add it to a total. Continue accepting scores until the user enters a negative value. Finally, calculate and display the average for the entered scores.

Answers

Answer:

total = 0

count = 0

while(True):

   grade = float(input("Enter a grade: "))

   if grade < 0:

       break

   else:

       total += grade

       count += 1

       

average = total/count

print("The average is: " + str(average))

Explanation:

*The code is in Python.

Initialize the total and count as 0

Create a while loop that iterates until a specific condition is met inside the loop

Inside the loop, ask the user to enter a grade. If the grade is smaller than 0, stop the loop. Otherwise, add the grade to the total and increment the count by 1.

When the loop is done, calculate the average, divide the total by count, and print it

In which situations would it be most helpful to filter a form? Check all that apply.

Answers

Filtering is a useful way to see only the data that you want displayed in Access databases.

Let K(x, y) denote the statement "x knows y" and D denote the domain of all people. Express the following English sentences as a quantified proposition using the definitions above:

1. Everybody knows somebody.
2. There is somebody that no one knows.
3. There is no one who knows everybody

Answers

Answer:

Given: K(x,y) denotes statement:

"x knows y"

D denote domain of all people.

Explanation:

1. Everybody knows somebody.

Solution:

∀x∈D ∃y∈D : K(x, y)

∀ means for all. Here it is used for Everybody.

∃ means there exists some. Here it represents Somebody.

∈ means belongs to . Both x and y belongs to the domain D of all people.

2. There is somebody that no one knows.

Solution:

∀x∈D ∃y∈D : ¬K(x, y)

∀ means for all. ∃ means there exists some. ∈ means belongs to both x and y belongs to the domain D of all people.¬ this is negation sign which means not K(x,y). So the negation of everybody knows somebody can be expressed as there is somebody that no one knows.

3. There is no one who knows everybody

Solution:

This can be represented in both the ways below.

∀ y∈D ∃ x∈D : K(x, y)

∀ means for all. ∃ means there exists some. ∈ means belongs to both x and y belongs to the domain D of all people.

∀x∈D ∀y∈D : ¬K(x, y)

∀ means for all. The negation shows that there is no one who knows everybody.

A/an ____ file saves a workbook as a comma-delimited text file for use on another windows operating system??

A. XPS
B. TXT
C. ODS
D. CVS

Answers

Answer:

The correct option is D

D) CVS

Explanation:

A CVS file saves a workbook as a comma-delimited text file for use on another windows operating system. It ensures that line breaks, tab characters and other characteristics are interpreted correctly.

A CVS file stands for Comma Separated Value file, which basically allows the data to be saved in tabular format. However they differ from other spreadsheet file types because you can only have a single sheet in a file. Moreover, you cannot save cell, column or row in it.

A vSphere Administrator is receiving complaints a database VM is experiencing performance issues. The VM is a member of the high priority resource pool and the cluster has not experienced contention.
Which condition should be checked to address immediate performance concerns?
A. VM snapshots
B. VMFS version
C. Resource Pool share value
D. Configured CPU shares

Answers

Answer:

C. Resource Pool share value.

Explanation:

The vSphere is a term used to describe the VMware’s virtualization cloud platform. The vSphere comprises of the following, vCenter Server, ESXi, Virtual Machine File System (VMFS) and vCenter Client.

If a vSphere Administrator receive complaints that a database Virtual Machine (VM) is experiencing performance issues and the Virtual Machine (VM) is a member of the high priority resource pool and the cluster has not experienced contention.

In order to address immediate performance concerns, the vSphere Administrator should check the Resource Pool share value.

VMware resource pool refers to the aggregated central processing unit and memory allocated to a Virtual Machine (VM) for flexible management of the resources.

Also, the vSphere Administrator should install VMware tools to check which processes are having high CPU usage by using vimtop, as well as checking if vCenter Server is swapping.

In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that are ____________. These processes safeguard against any risks that might occur due to key staff being unavailable or distracted.

Answers

Answer:

automated

Explanation:

Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.

You are working at the Acme company that has the following environment: 400 Windows Servers 2. 8000 Windows client devices (laptops running Windows os) 40 Linux servers Active Directory Domain Services to provide dns services to all the hosts, both Windows and Linux. Acme acquires a small research company, Uni-Tech that uses Unix servers for all of its applications. For host resolution they use BIND
a. Describe what BIND is and what the acronym stands for? BIND stands for Berkley Internet Name Domain. BIND allows you to pick one of your computers to act as the DNS server.
b. This acquisition happens very quickly and on day one the business needs people at Uni-Tech to connect to hosts at Acme using hosts names that can be resolved by Active Directory. Describe a method for integrating the two environments that does not require too many individual tasks that will take many hours. (10) Describe how you would test to make sure your integration is working correctly.

Answers

Answer: Provided in the explanation section

Explanation:

(a). BIND is a type of DNS server used on the internet, actually it is reported to be most widely used DNS server on the internet. Also BIND is the de-facto standard on Unix like operating systems and Linux. Thus it can be used to locate computers on a network using domain names instead of their IP addresses. BIND was originally programmed at the University of California, Berkeley in the 1980s, this was made possible by a grant from US based DARPA program.

Originally, BIND stood for Berkeley Internet name daemon, but nowadays it is called Berkeley Internet name domain.

(b). In some of the clients in windows and Windows servers we will install LDP. By the LDP.exe we can test tDNS, Active directory woking , even we can add or modify. LDP is used to test and verify the Active Directory objects. We will install in windows machine then open the software, then from the menu we will select connect and type the IP adress of the Active Directory then we will select or type the objects of Active directory. For Linux system we have to openldap and can search the AD.

From Linux or Unix we can use the nmap tool which can test the network connectivity between all the computers whether it is windows or Linux. By nmap we can test by ICMP protocol to verify the network connectivity. By nmap we can scan all the port which are required to open from client to the server. We can also use nslookup to test DNS server from the client. By nslookup we can check that client can connect the server.

The new Director of Information Technology has asked you to recommend a strategy to upgrade the servers on their network. Recommendations on server hardware, CPU chip set, speed, and caching are needed. You should also recommend which servers to upgrade first and determine whether any servers are still appropriate to keep.

Answers

Answer:

servers to be upgraded are : APPLICATION AND LOAD BALANCING SERVERS

servers still appropriate to use : DNS AND DHCP SERVERS

Explanation:

The recommendations to be made in line with what the new director of information is asking for includes :

1 ) For the servers to be upgraded : The servers that requires upgrades  includes the APPLICATION SERVER and LOAD BALANCING SERVER. this is because these two servers are critical to the growth/expansion of any business, and they handle large volume of data

Recommendations on the servers upgrade includes:

Hardware : 2.3 GHz Intel Xeon Gold 5118 12-Core

CPU chip set :  Socket: FCLGA3647, Type: NSBM

Speed : processor 3.2 GHz

caching:   > 100 Gb

2)  For servers that do not necessarily need to be upgraded : The servers that do not need immediate upgrade are DNS and DHCP

public class Student {
private String getFood() {
return "Pizza";
}
public String getInfo() {
return this.getFood();
}
}
public class GradStudent extends Student {
private String getFood() {
return "Taco";
}
public void teach(){
System.out.println("Education!");
getInfo();
}
}
What is the output from this:

Student s1 = new GradStudent();
s1.teach();
Education! would be printed, followed by a run-time error when getInfo is called.

Education! Pizza

This code won't run because it won't compile.

Education! Taco

This code causes a run-time error because getInfo is not declared in the GradStudent class.

Answers

Answer:

getInfo(); ==

getSy.Info()

Explanation:

Get System Info

Other Questions
Joe needs to replace the carpet in his living room and hallway with laminate flooring. A floor plan is shown below. Can you help him to find the total area of floor that needs to be covered? The total cost of a pair of jeans and three shirts is $114. The shirts each cost the same amount, and the jeans are $45.What is the price per shirt?a.) $69b.) $23c.) $53d.) $159 Who were important cultural figures of the Age of Romanticism? Select all that apply. Beethoven Chopin Irving Bismarck Poe Find the area of the circles. Use 3.14 for . (Show work for full credit) At what distance did Maria and James run the same amount of time Find the unknown side of the triangle below (round to the nearest tenth).A. 18 cmB. 22.9 cmC. 26.9 cmD. 21.2 cmPlease answer this Explain the ceremonial and real executive functions of the president in the presidential system of government Can I please have help Goodlife charges its members $30 per month for a gym membership. They currently have 75 clients. Research has shown that for every $2 increase in their membership price they will lose 3 clients. If they want to maximize their revenue, how much should Goodlife charge per membership? What will their maximized revenue be? Pure ethanol has an octane rating of about 113. E85, Which contains 35 percent oxygen by weight, has an octane rating of about How many beats are in the following example, including rests?A. 4.B. 3.5C. 2.D. 3 Kayla has $45 and wants to buy three shirts that are originally priced at $18 each. They are on sale for 20% off. After applying 5% tax, does Kayla have enough money to purchase the three shirts Find the speed of a car on km/hr that is movingat speed 144mls How can you solve for x in the proportion StartFraction 7 over 8 EndFraction = StartFraction x over 24 EndFraction? Set the sum of 7 and 8 equal to the sum of 24 and x, and then solve for x. Set the sum of 7 and 24 equal to the sum of 8 and x, and then solve for x. Set the product of 7 and 8 equal to the product of 24 and x, and then solve for x. Set the product of 7 and 24 equal to the product of 8 and x, and then solve for x. how do i calculate the first quartile and the third quartile??? !!!please help!!! what is the passive of she ate rice? A families weekly shopping bill increases from 120 to 150, what is the percentage increase? PLEASE HELP if f(x)=ln(sin(2x)), f''(/4) is equal to How much would $100 invested at 6% interest compounded monthly be worth after 20 years? Round to the nearest cent. What was a shortcoming of the Agricultural Adjustment act