Design and develop a VB.NET application to access the table
StudentRecord (Student_Id,Student_Name,Programme_Name,CGPA), and Perform insert, delete, Update and search for a student who achieved CGPA greater than 3.5.

Answers

Answer 1

Create a variety of Windows, Web, and mobile apps using the straightforward, multi-paradigm object-oriented programming language VB.NET, which is built on the.NET Framework.

Thus, Our VB.NET tutorial covers all the fundamental and advanced VB.NET topics, including forms, buttons, events, strings, arrays, program flow control, file and exception handling, and more.

Visual Basic is the abbreviation for VB.NET. Technologies that enable networks. It was created by Microsoft in 2002 and is a straightforward, high-level, object-oriented programming language.

The Microsoft.NET framework is used to develop this Visual Basic 6.0 replacement. Additionally, it supports OOPs concepts like polymorphism, inheritance, encapsulation, and abstraction.

Thus, Create a variety of Windows, Web, and mobile apps using the straightforward, multi-paradigm object-oriented programming language VB.NET, which is built on the.NET Framework.

Learn more about Microsoft, refer to the link:

https://brainly.com/question/2704239

#SPJ4


Related Questions

Using the ARMv8 A64 instruction set, write a program that places
the decimal values #2, #3, and #4 in registers 2, 3, and 4,
respectively. The program then computes the sum of the three
values, moves

Answers

Here is the ARMv8 A64 instruction set program to place decimal values #2, #3, and #4 in registers 2, 3, and 4, respectively:```

       .text

       .global main

main:

       mov x2, #2        // Place decimal value #2 in register x2

       mov x3, #3        // Place decimal value #3 in register x3

       mov x4, #4        // Place decimal value #4 in register x4

       

       add x1, x2, x3    // Add the values in x2 and x3 and store the sum in x1

       add x1, x1, x4    // Add the value in x4 to the sum in x1

       // Now the sum of #2, #3 and #4 is in x1

```The program first uses the mov instruction to place decimal values #2, #3, and #4 in registers 2, 3, and 4, respectively.

Then, it uses the add instruction to compute the sum of the three values and store it in register 1. Finally, it ends the program by returning the value in register 1. The total number of words used in the program is 25,

Learn more about decimal here,

https://brainly.com/question/28393353

#SPJ11

You want to predict the demand for water in Houston in the coming week. Daily demand data is available for the last 10 years.
A. Which model will work for this problem? Why?
B. Imagine that in addition to the demand, there are daily maximum and minimum temperature data measured in Celsius. How would you add this variable to the model?

Answers

A) In this problem, the time series model would work for predicting the demand for water in Houston in the coming week.

B)Including daily maximum and minimum temperature data in the model can help to improve the forecast accuracy.

A) Time-series analysis is one of the statistical methods that are used to forecast future values from a series of previously recorded values. Time series models take into account the sequence and dependence between data observations. Hence, we can forecast the daily water demand for the next week using the time series model.

B) We can use these variables as independent variables and include them in the model. For example, we can use a multiple regression model that includes temperature variables as predictors along with the time series data. This will help us to identify the relationship between water demand and temperature and hence make more accurate predictions.

Learn more about forecastinga at

https://brainly.com/question/15542776

#SPJ11

You are working in a top tech company and two co-workers call you to decide over a dispute. Both of them developed a Branch and Bound based algorithm and both of them are testing their algorithms performance on the same system. Both algorithms are coded on python and both of them are taking inputs of the same size. However, one of the programs is consistently executing faster than the other. They call you to decide which algorithm is best.
After evaluating both codes, you came up to the conclusion that both programs are basically the same and regardless of naming conventions and some extra constant checks both algorithms must be running at the same speed.
What could be the difference between the runs? Why one of them is running faster even when both have the same input size?

Answers

After evaluating both codes, it is concluded that both programs are basically the same and regardless of naming conventions and some extra constant checks both algorithms must be running at the same speed.

However, one of them is running faster even when both have the same input size. There could be several reasons why one algorithm is running faster even though both have the same input size. Some of the reasons are given below:1. Hardware differences:The two programmers might be testing their algorithms on two different hardware configurations. They could have different CPUs, RAMs, or hard drives. The difference in hardware can affect the performance of the algorithms.

2. Implementation: Although both programs are Branch and Bound based algorithms, one programmer could have implemented their algorithm more efficiently than the other. The programmer who has implemented the algorithm more efficiently could be using a faster algorithm or using more optimized data structures.3. External dependencies: One program could be using external dependencies, such as libraries, that are better optimized for the task at hand. These external dependencies can improve the performance of the algorithm.4. The efficiency of coding: Even though both programs are written in Python, one of the programmers may have written more efficient code. Efficient coding can affect the performance of the algorithm.

To know more about the codes visit:

https://brainly.com/question/29590561

#SPJ11

YAKIN YAKIN UNIVER ESI NË YAKI NIVERSITY RSITY ( RSITY () ST UNIVER RSITY())) 1 Marked out of 25.00 Not yet answered 1. Draw logic diagrams from the Boolean functions. • Z= f(A,B,C) = BC + ABC + AB

Answers

Logic diagrams for the given Boolean function f(A, B, C) = BC + ABC + AB can be drawn using logic gates such as AND, OR, and NOT gates.

To draw logic diagrams for the given Boolean function, we need to break it down into its individual terms and represent them using appropriate logic gates.

The function f(A, B, C) = BC + ABC + AB can be simplified as follows:

f(A, B, C) = BC + ABC + AB

         = BC + AB(C + C)

         = BC + AB

To represent BC, we can use an AND gate with inputs B and C. Similarly, AB can be represented using another AND gate with inputs A and B. Finally, to combine the two terms, we can use an OR gate with inputs from the outputs of the two AND gates.

By connecting the appropriate inputs and outputs of the gates, we can construct the logic diagram that represents the given Boolean function.

Learn more about Logic diagrams

brainly.com/question/33183853

#SPJ11

Which statement is false about multidimensional arrays?
C supports multidimensional arrays.
A common use of multidimensional arrays is to arrange data into tables consisting of rows and
columns.
C.
To identify a particular table element requires two indices.
d
Every ANSI C system can support arrays with as many indices as the programmer chooses
c Language

Answers

The false statement about multidimensional arrays is: "Every ANSI C system can support arrays with as many indices as the programmer chooses."

In C, the number of indices in a multidimensional array is fixed at compile-time. The dimensions of the array must be known beforehand. While C supports multidimensional arrays, the number of dimensions needs to be specified in the array declaration. Therefore, the statement suggesting that C systems can support arrays with as many indices as the programmer chooses is false. The number of dimensions is predetermined and fixed.

The false statement is that every ANSI C system can support arrays with any number of indices as chosen by the programmer.

To know more about Array Declaration visit-

brainly.com/question/30870442

#SPJ11

Write an assembly language routine that enables the user to enter a number. The program (routine) will count up from that number that was entered till it reaches 250. Once it reached 250 it will count down by 2 till it will reach 240 and thereafter the program will end.

Answers

The assembly language routine can be implemented using the following steps:

1. Store the user input number in a register.

2. Use a loop to increment the number by 1 until it reaches 250.

3. Once the number reaches 250, start a new loop to count down by 2 until it reaches 240.

4. After reaching 240, terminate the program.

Here's the code snippet in a high-level representation:

```assembly

; Initialize register with user input number

MOV reg, user_input

; Count up from user input to 250

UP_LOOP:

   CMP reg, 250

   JG DOWN_LOOP

   ; Display or use the number as required

   INC reg

   JMP UP_LOOP

; Count down from 250 to 240 by 2

DOWN_LOOP:

   CMP reg, 240

   JL END_PROGRAM

   ; Display or use the number as required

   SUB reg, 2

   JMP DOWN_LOOP

; End of program

END_PROGRAM:

``

In this code, `reg` represents the register where the number is stored, and `user_input` is the variable holding the user's input number.

The assembly language routine allows the user to enter a number and counts up from that number until it reaches 250. Then, it counts down by 2 until it reaches 240, after which the program ends. This routine provides a basic example of using loops and conditional branching in assembly language to perform counting operations.

To know more about Assembly visit-

brainly.com/question/31590404

#SPJ11

Determine whether the following resource-allocation graph has a
deadlock? (Assumption: every
resource has only one instance). Show all of your work
Determine whether the following resource-allocation graph has a deadlock? (Assumption: every resource has only one instance). Show all of your work (15 pts.) R5 P1 R3 R13 R11 P3 P2 R6 R10 P5 R1 R20 R2

Answers

The given resource-allocation graph does not have a deadlock.

To determine if the resource-allocation graph has a deadlock, we need to analyze the graph for the presence of cycles that contain both processes and resources. A deadlock occurs when there is a circular wait, where each process is waiting for a resource held by another process in the cycle.

Looking at the given graph, we can identify the following dependencies:

- P1 is requesting R5.

- P2 is requesting R3.

- P3 is requesting R13.

- P5 is requesting R6.

- P1 is holding R6.

- P2 is holding R10.

- P3 is holding R5.

- P5 is holding R3.

To check for a deadlock, we need to find a cycle that involves both processes and resources. By observing the graph, we can see that there are no cycles that satisfy this condition. Each process either holds the resource it requires or is requesting a resource that is not being held by another process. Therefore, no circular wait exists.

In conclusion, based on the absence of cycles involving both processes and resources, the given resource-allocation graph does not have a deadlock.

Learn more about deadlock here:

https://brainly.com/question/31826738

#SPJ11

Complete Question :

Determine whether the following resource-allocation graph has a deadlock? (Assumption: every resource has only one instance). Show all of your work

which of the following is a standard, proven work process that enables those involved to make controlled and orderly progress in developing high-quality software?

Answers

The correct answer is "Software Development Life Cycle (SDLC)." The SDLC is a standard and proven work process that enables those involved in software development to make controlled and orderly progress in developing high-quality software.

It encompasses a set of phases, including requirements gathering, system design, coding, testing, deployment, and maintenance.

The SDLC provides a structured approach to software development, ensuring that all necessary steps are followed and that the development process is efficient, reliable, and produces high-quality software.

learn more about Software Development Life Cycle (SDLC) here:

brainly.com/question/9977671

#SPJ11

Write a MATLAB script where the user inputs their birth date only, and the output given to the user includes at least five of the following options: Day of the week of birth • Age in years Years spent asleep Billions of miles travelled around the sun • Age in minutes Approximate time spent watching TV Approximate gallons of water consumed Approximate numbers of blinks experienced Approximate number of miles walked

Answers

The task is to create a MATLAB script that requests a user's birth date and, in response, provides various fun and interesting metrics related to their life.

These might include the day of the week they were born, their age in years, the time spent asleep, and the approximate distance they have traveled around the sun. For the script, you would use MATLAB's `input` function to capture the user's birth date. Then, you'd employ various mathematical and temporal calculations to determine the desired metrics. You would use the `dative` and `now` functions to calculate the user's age in years. From this, you can extrapolate other interesting facts such as billions of miles traveled around the sun (by multiplying the age by the Earth's average orbital distance), or the years spent asleep (assuming an average sleep duration). Remember to provide output in a friendly, understandable format using the `fprintf` or `disp` function.

Learn more about MATLAB script here:

https://brainly.com/question/32707990

#SPJ11

please help me find the highest Fibonacci number your machine can generate, using the sample fibo() function provided in c++. Also, please help me convert this fibo() function to Java and Python.
C++ sample codes:
#include
using namespace std;
long fib(int position)
{
if (position == 0)
return 0;
else if (position == 1)
return 1;
else
return fib(position-1) + fib(position-2);
}
// complexity = exponential, or 2^n,n =linear
int main()
{
int n;
for (n=0;n<50;n++)
cout << fib(n) << " ";
return 0;
}

Answers

The highest Fibonacci number a machine can generate using the sample `fibo()` function provided in C++ can vary depending on the architecture and available memory of the machine. However, in most machines, the highest Fibonacci number that can be generated using the `fibo()` function is 1836311903.

The function can be converted into Java and Python as follows:

Java:

```java
public static long fib(long n) {
   if (n == 0)
       return 0;
   else if (n == 1)
       return 1;
   else
       return fib(n-1) + fib(n-2);
}
```

Python:

```python
def fib(n):
   if n == 0:
       return 0
   elif n == 1:
       return 1
   else:
       return fib(n-1) + fib(n-2)
```
The highest Fibonacci number that can be generated using these functions in Java and Python is also dependent on the architecture and available memory of the machine.

However, it is typically the same as the C++ implementation, which is 1836311903. The function `fibo()` has an exponential complexity of O(2^n), which is not efficient for large values of n.

To know more abut highest visit;

brainly.com/question/29829770

#SPJ11

6. (20 pt., 5 pt. each) Suppose that 87% of the patients in a hospital are infected with COVID19. Also suppose that when a PCR test for COVID-19 is administered, 65% of the infected patients test positive and 17% of the non-infected patients test positive.
a. What is the probability that a patient is infected if they test positive?
b. What is the probability that a patient is infected if they test negative?
c. What is the probability that a patient is not infected if they test positive?
d. What is the probability that a patient is not infected if they test negative?

Answers

a. Probability that a patient is infected if they test positive:
The formula for conditional probability is P(A|B) = P(A and B) / P(B)
Using the information given, we can calculate the following probabilities:
To find P(B), we need to use the law of total probability:
P(B) = P(B|A)P(A) + P(B|A')P(A') = 0.65*0.87 + 0.17*(1-0.87) = 0.3056
Now we can calculate P(A|B) as follows:
P(A|B) = P(A and B) / P(B) = P(B|A)P(A) / P(B) = 0.65*0.87 / 0.3056 = 0.1856 or 18.56%

b. Probability that a patient is infected if they test negative:
P(A'|B) = P(A' and B) / P(B)
P(A' and B) = P(B) - P(A and B) = 0.3056 - 0.65*0.87 = 0.1114
P(A'|B) = P(A' and B) / P(B) = 0.1114 / 0.3056 = 0.3642 or 36.42%


c. Probability that a patient is not infected if they test positive:
P(A'|B) = P(A' and B) / P(B)
P(A' and B) = P(B) - P(A and B) = 0.3056 - 0.65*0.87 = 0.1114
P(A'|B) = P(A' and B) / P(B) = 0.1114 / 0.3056 = 0.3642 or 36.42%

d. Probability that a patient is not infected if they test negative:
P(A'|B') = P(A' and B') / P(B')
To find P(A' and B'), we can use the fact that P(B') = P(B'|A')P(A') + P(B'|A)P(A) and rewrite it as:
P(A' and B') = P(B') - P(A and B') = (1 - P(B|A))P(A') = 0.35*0.13 = 0.0455
P(A'|B') = P(A' and B') / P(B') = 0.0455 / 0.6944 = 0.0655 or 6.55%

To know more about infected visit:

https://brainly.com/question/29251595

#SPJ11

Complete the program by adding a few state variables, and two functions, so that it will draw a circle that moves back and forth along a horizontal line, as shown here. The circle will normally move at a constant speed, but will freeze in place whenever the mouse button is pressed, resuming its motion when the mouse button is released. 1. The following constants are supplied. X_LEFT and X_RIGHT are the x coordinates of the ends of the line, and Y is the y coordinate of everything (both ends of the line, and the centre of the circle). BALL_DIAM and BALL_SPEED give the diameter of the circle (in pixels) and the speed of motion of the circle (in pixels per frame). (But that motion will change between right-to-left and left-to-right.) 2. Define the "state variables" needed to keep track of the current situation. You need to know the current position of the centre of the circle (use a float) and whether the circle is moving to the left, or to the right (you must use a boolean variable for this). 3. Add the drawA11() function which will erase the window to grey, and draw the line and the circle. 4. Add the moveBall() function which will cause the circle to move back and forth along the line. Whenever the centre of the circle goes beyond either end of the line, it should change direction. Whenever the mouse button is pressed, the circle should not move. Otherwise it should move BALL_SPEED pixels to the left, or to the right, according to the value of your boolean state variable. Use IF statements to do these things (you will need at least 3 of them, perhaps 4). PLEASE USE PROCESSING.ORG LANGUAGE

Answers

This program uses the Processing language to create a window and draw a moving circle along a horizontal line. The circle moves back and forth at a constant speed, but freezes when the mouse button is pressed and resumes motion when the button is released.

```python

# Constants

X_LEFT = 50

X_RIGHT = 450

Y = 200

BALL_DIAM = 50

BALL_SPEED = 5

# State variables

circleX = X_LEFT + BALL_DIAM / 2

movingLeft = True

mousePressed = False

def setup():

   size(500, 400)

def draw():

   background(200)

   drawA11()

   moveBall()

def drawA11():

   # Draw line

   stroke(0)

   line(X_LEFT, Y, X_RIGHT, Y)

   

   # Draw circle

   fill(255)

   ellipse(circleX, Y, BALL_DIAM, BALL_DIAM)

def moveBall():

   global circleX, movingLeft

   

   if not mousePressed:

       # Move the circle according to the current direction

       if movingLeft:

           circleX -= BALL_SPEED

       else:

           circleX += BALL_SPEED

       # Change direction if the circle goes beyond either end of the line

       if circleX <= X_LEFT or circleX >= X_RIGHT:

           movingLeft = not movingLeft

def mousePressed():

   global mousePressed

   mousePressed = True

def mouseReleased():

   global mousePressed

   mousePressed = False

```

The state variables `circleX` and `movingLeft` keep track of the current position and direction of the circle, while the `mousePressed()` and `mouseReleased()` functions handle the mouse button events. The `drawA11()` function is responsible for drawing the line and the circle, while the `moveBall()` function controls the movement of the circle.

Learn more about button here:

https://brainly.com/question/32341939

#SPJ11

How do you consider that the study of Integral and Vector Calculus contributes to the functions and roles that you will perform as an information technology engineer, to understand engineering problems, propose alternative solutions at different levels, and contribute to the development of research? 100 words

Answers

Integral Calculus provides a toolset for computing areas, volumes, and centers of mass, which can be applied in computer graphics, image processing, and numerical simulations.

Vector Calculus is essential for analyzing and optimizing algorithms, designing efficient networks, and modeling physical phenomena such as electric fields, heat transfer, and fluid flow. Information Technology Engineers can use these techniques to optimize the performance of software and hardware systems, analyze data patterns, and develop predictive models for decision-making. By understanding engineering problems at a fundamental level, Information Technology Engineers can propose alternative solutions at different levels, ranging from algorithm design to system architecture, and contribute to the development of research by providing novel insights and tools for data analysis and simulation.

Overall, the study of Integral and Vector Calculus plays a critical role in enabling Information Technology Engineers to make informed decisions and solve complex problems in various domains.

To know more about Integral Calculus visit:

https://brainly.com/question/24705479

#SPJ11

What is the time complexity to insert a new value to a sorted array and unsorted array respectively? Assume the array has unused slots and the elements are packed from the lower end (index 0) to higher index. Where N represents the problem size, and C represents a constant. To keep track the status of the array, two variables (array capacity and the location of the last used slot are used to keep track the status of the array. O(N), O(N) 0(N), O(C) O(C), O(N) O(C), O(C)

Answers

The time complexity for inserting a new value to a sorted array is O(N), and the time complexity for inserting a new value to an unsorted array is O(1).

The time complexity to insert a new value to a sorted array and an unsorted array respectively is as follows:

For a sorted array:

Time complexity: O(N)

Explanation: In a sorted array, to insert a new value while maintaining the sorted order, we need to find the correct position to insert the value. This typically requires shifting elements to make room for the new value, which takes linear time proportional to the number of elements in the array.

For an unsorted array:

Time complexity: O(1)

Explanation: In an unsorted array, we can simply insert the new value at any available slot without the need for shifting elements or maintaining any specific order. This operation can be done in constant time, regardless of the size of the array.

Therefore, the time complexity for inserting a new value to a sorted array is O(N), and the time complexity for inserting a new value to an unsorted array is O(1).

learn more about array  here

https://brainly.com/question/13261246

#SPJ11

can
somebody snswer question 5A and 5B
can you please put it like this below. i also provided a
screenshot of the questions abd they are also below
5A): answer here
5B): answer here
5. (1 point) (a) What different switching mechanisms exist to forward datagrams from an input port to an output port in a router? (b) What are their advantages and disadvantages respectively?

Answers

Different switching mechanisms exist to forward datagrams from an input port to an output port in a router. The switching mechanisms are store-and-forward switching, cut-through switching, and fragment-free switching. These mechanisms differ based on the amount of data that the router examines before forwarding.
The advantages and disadvantages of each switching mechanism are as follows:i) Store-and-forward switching: It is the safest switching method since the router examines the entire packet before forwarding it. This reduces the probability of erroneous packets being forwarded. The disadvantage of this mechanism is that it adds to the delay in the forwarding process since the entire packet is examined.ii) Cut-through switching: It is the quickest switching mechanism since the packet is forwarded as soon as the destination address is read. The disadvantage of cut-through switching is that it doesn't have an error-checking feature and may forward an erroneous packet.iii) Fragment-free switching: It is faster than store-and-forward switching, and examines only the first 64 bytes of a packet. This means that it can quickly detect a collision in the network. The disadvantage is that it can't detect an error that occurs beyond the first 64 bytes of a packet.

To know more about datagrams, visit:

https://brainly.com/question/31117690

#SPJ11

When the following code is executed using the pipeline shown in figure attached: Cycle Instruction 1 N 3 4 01 6 7 add $t0,$t1, $t2 F add $80, $50, $al lw $s3, 4($t0) sub $s3, $80, $sl At cycle 1, right before the instructions are executed, the processor state is as follows: 1. The PC has the value 100 2. Every register has the initial value 10ten plus the register number (e.g., register $8 has the initial value of 18 ten). Refer to MIPS data sheet to translate register names into register numbers. 3. Every memory word accessed as data has the initial value 100 .co plus the byte address of the word (e.g., Memory[8] has the initial value of 108 zen). Determine the value of each field in the IF/ID and EX/ MEM pipeline registers during CYCLE 6. Assume that there is NO data forwarding. All hazards are detected and cause stalls (not shown in figure). Hint: Pay attention to the data dependencies. Use the pipeline diagram to figure out the state of each instruction at cycle 6. Assume that register writes happen in the first half of the clock cycle and register reads happen in the second half of the clock cycle.

Answers

Cycle 1:At cycle 1, right before the instructions are executed, the processor state is as follows:

1. The PC has the value 100. 2. Every register has the initial value 10ten plus the register number (e.g., register 8 has the initial value of 18 ten). 3. Every memory word accessed as data has the initial value 100 .co plus the byte address of the word (e.g., Memory[8] has the initial value of 108 zen).Cycle 6:During cycle 6, the following is true for the IF/ID and EX/MEM pipeline registers. There is no data forwarding. All hazards are detected and cause stalls (not shown in figure).1. For the add t0,t1, t2 instruction, the IF/ID pipeline register will contain the instruction 01, which represents the opcode for the add instruction.

The RS field will contain the register number for t1, which is 9, the RT field will contain the register number for t2, which is 10, and the RD field will contain the register number for t0, which is 8.2. For the add 80, 50, al instruction, the IF/ID pipeline register will contain the instruction 20, which represents the opcode for the addi instruction. The RS field will contain the register number for 50, which is 18, and the RT field will contain the register number for al, which is 16.3. For the lw s3, 4(t0) instruction, the IF/ID pipeline register will contain the instruction 8, which represents the opcode for the lw instruction.

The RS field will contain the register number for t0, which is 8, and the RT field will contain the register number for s3, which is 19. The EX/MEM pipeline register will contain the memory address to be accessed, which is 36 (since the value in t0 is 8, and the offset is 4).4. For the sub s3, 80, sl instruction, the IF/ID pipeline register will contain the instruction 0x22, which represents the opcode for the sub instruction.

The RS field will contain the register number for 80, which is 24, the RT field will contain the register number for sl, which is 17, and the RD field will contain the register number for s3, which is 19. The EX/MEM pipeline register will contain the result of the subtraction, which is 0x78.

To know about processor visit:

https://brainly.com/question/30255354

#SPJ11

How does quorum consensus guarantee strong consistency when
there is no node failure or network partition?(Please do not give
definition of strong consistency)

Answers

Quorum consensus is a method of achieving strong consistency in a distributed system. It requires that a certain number of nodes agree on a value before it can be considered committed. In the absence of node failure or network partition, this guarantee is maintained through the following ways:

All nodes have access to the same set of data and they must agree on the state of the data to perform transactions and operations on the data. A majority of the nodes must be in agreement for the system to function correctly. If the nodes cannot agree on a particular value, the transaction or operation fails.

Therefore, the system can be considered as strongly consistent. A node sends a request to the other nodes and waits for the responses. If the node receives a response from a majority of the nodes, it knows that the data is correct and up-to-date, and it can proceed with the transaction or operation. If a minority of nodes respond, the system cannot make any decisions as there is not enough agreement, and the transaction or operation will fail.

Therefore, the system remains strongly consistent under normal circumstances.

Know more about Quorum consensus:

https://brainly.com/question/4563021

#SPJ11

Write a Python program using function for each operations, to print product of 2 numbers and to print largest of two numbers. Use a proper selection structure to call any one of the functions defined Sample input/output: Python Program 1. PRODUCT 2. LARGEST Enter first number: 2 Enter second number: 3 Choose any of the given options: 2 3 number is Largest Number.

Answers

The Python program uses two functions: product() and largest() to perform two different operations on two given numbers.

The product() function takes two parameters, a and b, and returns their product by multiplying them.

The largest() function takes two parameters, a and b, and checks which number is larger. It uses a conditional statement to compare a and b and returns the larger number.

In the main part of the program, the user is prompted to enter two numbers (num1 and num2) and select an option. Based on the option chosen, the program calls the corresponding function and passes the two numbers as arguments.

If option 1 is selected, the program calculates the product of the two numbers using the product() function and prints the result.

If option 2 is selected, the program finds the largest number using the largest() function and prints the result.

If an invalid option is chosen, the program displays an error message.

Learn more about Python

brainly.com/question/30391554

#SPJ11

47. Which goal is achieved by using this pseudocode? Step 1: Start Step 2: Declare \( ( \) result \( =0 ; i=1) \) Step 3: Repeat \( n-1 \) times (result \( +=i ; i+=1 \) ) Step 4: Output value result

Answers

The goal that is achieved by using this pseudocode is to calculate the sum of the first n natural numbers.Pseudocode is a notation that can be used to express algorithms. It is an informal way to present code algorithms to other programmers.

This code is a pseudocode that is used to calculate the sum of the first n natural numbers. This code is helpful in solving various mathematical problems that require the summation of a given series of natural numbers.The pseudocode, in this case, declares two variables, i and result. The variable i is initialized to 1, and the variable result is initialized to 0. Afterward, the algorithm iterates the loop n - 1 times, with the aim of calculating the sum of the first n natural numbers. On each iteration, the value of i is incremented by 1, and the value of result is increased by the current value of i. Finally, the algorithm outputs the value of the variable result.A pseudocode is an outline or sketch of code that is intended to be developed further into more complete code. It is used to understand the logic behind the code and make the coding process easier. The above pseudocode is clear and concise and can be understood by any programmer or individual who has basic programming skills. In conclusion, the code is useful for solving various mathematical problems that require the summation of a given series of natural numbers.

To know more about natural numbers, visit:

https://brainly.com/question/17273836

#SPJ11

what is one disadvantage
4. What is one disadvantage of drill-and-practice programs? A. They don't provide students with instant feedback. B. They set the learning pace for students. C. They stop students immediately if they'

Answers

One disadvantage of drill-and-practice programs is that they set the learning pace for students. Option B is correct.

A drill-and-practice program is a computer-based program that offers practice of academic skills to the learners. They are mainly designed to help students in areas such as math, reading, or spelling. These programs aim to help students master the basics of a particular topic, such as multiplication, by providing repetition and feedback.

One of the main disadvantages of drill-and-practice programs is that they set the learning pace for students. This is a problem because not all students learn at the same pace. Students who are struggling may be left behind, while those who are advanced may be bored by the slow pace of the program. Therefore, drill-and-practice programs are not always the best approach to help students learn at their own pace or be challenged according to their level. Hence, Option B is correct: They set the learning pace for students.

To know more about the programs, visit:

https://brainly.com/question/14588541

#SPJ11

Compulsory Task 1 Follow these steps: • Create a program called taskl.py. • This program needs to display the timetables for any number. • For example, say the user enters 6 the program must print: The 6 times table is: 6x1=6 6x2=12 Hel 6x 12 = 72 • Compile, save and run your file.

Answers

The following program prints the timetable for any number that is input by the user. It works by accepting user input using the input() function, then generating a loop that runs from 1 to 12.

In each iteration of the loop, it multiplies the input number by the loop variable (which represents the current row of the timetable), then prints the result to the console.

Here's the code:```
# Compulsory Task 1: Times Tables
# By [Your Name]

# Get user input
number = int(input("Enter a number: "))

# Print times tables
print(f"The {number} times table is:")
for i in range(1, 13):
  print(f"{number}x{i}={number*i}")
```This code is saved in a file called "task1.py". To run the code, simply navigate to the directory where it is saved using the command line, then run the following command:```python task1.

py```This will execute the program and display the timetable for the number entered by the user. Note that this program is case-sensitive, so the file name must match exactly (i.e. "task1.py" not "Task1.py" or "taskl.py").

To know more about program visit:-

https://brainly.com/question/30613605

#SPJ11

Implement a city database using a Binary Search Tree (BST) to store the database records. Each database record contains the name of the city (a string of arbitrary length) and the coordinates of the city expressed as integer x- and y-coordinates. The BST should be organized by city name. Your database should allow records to be inserted, deleted by name or coordinate, and searched by name or coordinate. Another operation that should be supported is to print all records within a given distance of a specified point. Write a C++ code to implement the city database.

Answers

Certainly! Here's an example implementation of a city database using a Binary Search Tree (BST) in C++:

```cpp
#include <iostream>
#include <cmath>

struct City {
   std::string name;
   int x;
   int y;

   City(std::string cityName, int xCoordinate, int yCoordinate)
       : name(std::move(cityName)), x(xCoordinate), y(yCoordinate) {}
};

struct Node {
   City* city;
   Node* left;
   Node* right;

   explicit Node(City* cityRecord)
       : city(cityRecord), left(nullptr), right(nullptr) {}
};

class CityDatabase {
private:
   Node* root;

   Node* insertNode(Node* root, City* city) {
       if (root == nullptr) {
           return new Node(city);
       }

       if (city->name < root->city->name) {
           root->left = insertNode(root->left, city);
       } else if (city->name > root->city->name) {
           root->right = insertNode(root->right, city);
       }

       return root;
   }

   Node* findMinNode(Node* node) {
       while (node->left != nullptr) {
           node = node->left;
       }
       return node;
   }

   Node* deleteNode(Node* root, std::string cityName) {
       if (root == nullptr) {
           return nullptr;
       }

       if (cityName < root->city->name) {
           root->left = deleteNode(root->left, cityName);
       } else if (cityName > root->city->name) {
           root->right = deleteNode(root->right, cityName);
       } else {
           if (root->left == nullptr) {
               Node* temp = root->right;
               delete root;
               return temp;
           } else if (root->right == nullptr) {
               Node* temp = root->left;
               delete root;
               return temp;
           }

           Node* minRightNode = findMinNode(root->right);
           root->city = minRightNode->city;
           root->right = deleteNode(root->right, minRightNode->city->name);
       }

       return root;
   }

   Node* searchNodeByName(Node* root, std::string cityName) {
       if (root == nullptr || root->city->name == cityName) {
           return root;
       }

       if (cityName < root->city->name) {
           return searchNodeByName(root->left, cityName);
       }

       return searchNodeByName(root->right, cityName);
   }

   Node* searchNodeByCoordinate(Node* root, int xCoordinate, int yCoordinate) {
       if (root == nullptr || (root->city->x == xCoordinate && root->city->y == yCoordinate)) {
           return root;
       }

       if (xCoordinate < root->city->x || (xCoordinate == root->city->x && yCoordinate < root->city->y)) {
           return searchNodeByCoordinate(root->left, xCoordinate, yCoordinate);
       }

       return searchNodeByCoordinate(root->right, xCoordinate, yCoordinate);
   }

   void printCitiesWithinDistance(Node* root, int x, int y, int distance) {
       if (root == nullptr) {
           return;
       }

       int xDiff = std::abs(root->city->x - x);
       int yDiff = std::abs(root->city->y - y);
       int distanceSquared = xDiff * xDiff + yDiff * yDiff;

       if (distanceSquared <= distance * distance) {
           std::cout << "City: " << root->

city->name << ", X: " << root->city->x << ", Y: " << root->city->y << std::endl;
       }

       if (xDiff <= distance) {
           printCitiesWithinDistance(root->left, x, y, distance);
           printCitiesWithinDistance(root->right, x, y, distance);
       } else if (x < root->city->x) {
           printCitiesWithinDistance(root->left, x, y, distance);
       } else {
           printCitiesWithinDistance(root->right, x, y, distance);
       }
   }

public:
   CityDatabase() : root(nullptr) {}

   void insert(City* city) {
       root = insertNode(root, city);
   }

   void removeByName(std::string cityName) {
       root = deleteNode(root, cityName);
   }

   void removeByCoordinate(int xCoordinate, int yCoordinate) {
       Node* node = searchNodeByCoordinate(root, xCoordinate, yCoordinate);
       if (node != nullptr) {
           root = deleteNode(root, node->city->name);
       }
   }

   void searchByName(std::string cityName) {
       Node* node = searchNodeByName(root, cityName);
       if (node != nullptr) {
           std::cout << "City: " << node->city->name << ", X: " << node->city->x << ", Y: " << node->city->y << std::endl;
       } else {
           std::cout << "City not found." << std::endl;
       }
   }

   void searchByCoordinate(int xCoordinate, int yCoordinate) {
       Node* node = searchNodeByCoordinate(root, xCoordinate, yCoordinate);
       if (node != nullptr) {
           std::cout << "City: " << node->city->name << ", X: " << node->city->x << ", Y: " << node->city->y << std::endl;
       } else {
           std::cout << "City not found." << std::endl;
       }
   }

   void printCitiesWithinDistance(int x, int y, int distance) {
       printCitiesWithinDistance(root, x, y, distance);
   }
};

int main() {
   CityDatabase database;

   

   // Removing by name
   database.removeByName("City B");

   // Removing by coordinate
   database.removeByCoordinate(70, 80);

   // Printing cities within a distance from a specified point
   database.printCitiesWithinDistance(10, 20, 40);

   return 0;
}
```

This implementation creates a `City` struct to represent each city record and a `Node` struct to represent each node in the BST. The `CityDatabase` class contains methods for inserting, deleting, searching, and printing cities in the database.

The main function demonstrates how to use the city database by inserting records, searching for cities by name or coordinate, deleting records, and printing cities within a given distance from a specified point.

Please note that this implementation assumes unique city names and unique coordinates for simplicity. You may need to modify it accordingly if duplicates are allowed in your specific use case.

To know more about database
https://brainly.com/question/28033296
#SPJ11

(25 pts) Write a powershell script that reads the string passed to it on the command line and displays the ASCII values of each character in the string.

Answers

Each character in the string is converted to its corresponding ASCII value using the [char] type accelerator and then displayed using the Write-Host cmdlet. Here's a PowerShell script that reads a string passed as a command-line argument and displays the ASCII values of each character in the string:

powershell

Copy code

# Check if a string argument is provided

if ($args.Length -eq 0) {

   Write-Host "Please provide a string as a command-line argument."

   exit

}

# Get the string argument from the command line

$string = $args[0]

# Iterate over each character in the string

foreach ($char in $string) {

   $asciiValue = [int][char]$char

   Write-Host "Character: $char, ASCII Value: $asciiValue"

}

To use this script, save it with a .ps1 extension (e.g., ascii_values.ps1). Then, open a PowerShell console, navigate to the script's location, and run it with the desired string as a command-line argument:

powershell

Copy code

.\ascii_values.ps1 "Hello, world!"

This will output the ASCII values of each character in the provided string:

yaml

Copy code

Character: H, ASCII Value: 72

Character: e, ASCII Value: 101

Character: l, ASCII Value: 108

Character: l, ASCII Value: 108

Character: o, ASCII Value: 111

Character: ,, ASCII Value: 44

Character:  , ASCII Value: 32

Character: w, ASCII Value: 119

Character: o, ASCII Value: 111

Character: r, ASCII Value: 114

Character: l, ASCII Value: 108

Character: d, ASCII Value: 100

Character: !, ASCII Value: 33

To learn more about PowerShell script, visit:

https://brainly.com/question/29980993

#SPJ11

Help asap!
Write a TCP Java socket program that allows the server (router R1, node ID 3) to receive a DVR message from the client (router R2, node ID 2) and update R1's routing table using the DVR algorithm. The

Answers

Here is a Java socket program that will help you achieve the goals specified in the question:```
import java.net.*;
import java.io.*;
import java.util.*;
public class RouterServer {
public static void main(String[] args) throws IOException {
ServerSocket serverSocket = null;
try {
serverSocket = new ServerSocket(9999);
} catch (IOException e) {
System.err.println("Could not listen on port: 9999.");
System.exit(1);
}
Socket clientSocket = null;
try {
clientSocket = serverSocket.accept();
} catch (IOException e) {
System.err.println("Accept failed.");
System.exit(1);
}
PrintWriter out = new PrintWriter(clientSocket.getOutputStream(), true);
BufferedReader in = new BufferedReader(
new InputStreamReader(
clientSocket.getInputStream()));
String inputLine;
while ((inputLine = in.readLine()) != null) {
if (inputLine.equals("DVR")) {
// Update R1's routing table using the DVR algorithm
}
}
out.close();
in.close();
clientSocket.close();
serverSocket.close();
}
}```This Java program listens on port 9999 for a client socket connection and expects a message to be sent containing "DVR". Once "DVR" is received, the program will execute the DVR algorithm to update R1's routing table.

To know more about JAVA, visit:

https://brainly.com/question/33208576

#SPJ11

The desktop operating system described in this chapter all have an optional character mode . command line interface (

Answers

False. The desktop operating systems described in this chapter do not have an optional character mode command line interface.

These operating systems typically have a graphical user interface (GUI) as the primary mode of interaction, which provides a visual representation of the operating system and allows users to interact with it using a mouse, keyboard, and graphical elements such as windows, icons, and menus.

While some of these operating systems may provide a command line interface as an additional option for advanced users or specific tasks, it is not the default or primary mode of interaction.

Some desktop operating systems primarily rely on graphical user interfaces (GUIs) and may not provide a character mode command line interface as an option. It depends on the specific operating system and its design.

To read more about operating systems, visit:

https://brainly.com/question/22811693

#SPJ11

no
explanation
What is the value of yibbi \( (3,2) \) if yibbi \( (a, b) \) is defined as: yibbi(int a, int b): if \( b=0 \) return 1 else return yibbi \( (a, b / 2) \)

Answers

Recursive definition is a mathematical or computational definition that defines a function, sequence, or set in terms of itself, allowing for self-reference and repeated application of the definition.

The value of yibbi(3, 2) can be determined by applying the recursive definition of yibbi:

yibbi(int a, int b):

if b = 0:

return 1

else:

return yibbi(a, b / 2)

To calculate yibbi(3, 2), we start with the given values a = 3 and b = 2:

yibbi(3, 2) -> yibbi(3, 1)

Since b = 1 is not equal to 0, we continue with the recursive call:

yibbi(3, 1) -> yibbi(3, 0)

Now b = 0, so we return 1 as per the condition:

yibbi(3, 0) = 1

Therefore, the value of yibbi(3, 2) is 1.

To know more about Recursive definition visit:

https://brainly.com/question/28105916

#SPJ11

You are working on an application which has 4 continuous variables that change over time. You would like to visualize the trends over time for each variable on the same plot without facets using Seabo

Answers

To visualize the trends over time for four continuous variables on the same plot without facets using Seaborn, we can utilize the line plot or point plot functionality provided by Seaborn.

These plots allow us to display the values of the variables on the y-axis and the corresponding time points on the x-axis. By plotting all four variables on the same plot, we can easily compare their trends and observe any relationships or patterns.

Seaborn is a Python data visualization library built on top of Matplotlib. To visualize the trends over time for the four continuous variables, we can use the line plot or point plot function from Seaborn. These functions allow us to specify the x-axis as the time variable and the y-axis as the corresponding values for each variable. By plotting all four variables on the same plot, we can observe their trends and identify any similarities or differences.

To create the plot, we need to import the necessary libraries (Seaborn and Matplotlib) and load the data containing the time and variable values. We can then use the line plot or point plot function, specifying the x-axis as the time variable and the y-axis as the variable values. By customizing the plot with labels, titles, and legends, we can make it more informative and visually appealing.

This approach allows us to visualize the trends over time for multiple variables in a single plot, facilitating the comparison and analysis of their behavior.

Learn more about Python here:

https://brainly.com/question/32166954

#SPJ11

Employee is a base class and HourlyWorker is a derived class, with an overridden print function. Given the following statements, will the output of the two print function calls be identical? HourlyWorker h; Employee *ePtr = &h; ePtr->print(); ePtr->Employee: :print (); A. yes, if print is a virtual function. B. no, if print is a non-virtual function. C. yes, if print is non-virtual function. D. It would depend on the implementation of the print function.

Answers

The correct answer is A. Yes, if print is a virtual function.

If the print function in the Employee class is declared as virtual, and the print function in the HourlyWorker class is overridden and also declared as virtual, then the output of the two print function calls will be identical.

When a function is declared as virtual in the base class, it enables dynamic dispatch, which means that the appropriate function to call is determined at runtime based on the actual type of the object. In this case, since ePtr is a pointer of type Employee* but pointing to an object of type HourlyWorker, calling ePtr->print() will invoke the overridden print function in the HourlyWorker class.

If the print function is non-virtual, the function call ePtr->print() will always invoke the print function in the Employee class, regardless of the actual type of the object. Therefore, the output of the two function calls will not be identical.

Therefore, the correct answer is A. Yes, if print is a virtual function

Learn more about print function here:

brainly.com/question/31624927

#SPJ11

Write a query to return the department name and the average of the employees’ salary in each department where employee name starts with 'S', and round the result to two digits to the right of decimal point.

Answers

To return the department name and the average of the employees’ salary in each department where employee name starts with 'S', and round the result to two digits to the right of decimal point, the following query can be used:

SELECT department_name, ROUND(AVG(salary), 2) AS average_salary FROM employeesJOIN departments ON employees. department_id = departments. department_id WHERE employee_name LIKE 'S%'GROUP BY department_name;

The above query makes use of the JOIN statement to combine data from both the employees and departments tables based on the department_id column. The WHERE clause is then used to filter the results so that only employee names starting with the letter 'S' are returned.
The ROUND function is then used to round the result to two decimal places as required in the question. Finally, the results are grouped by department_name using the GROUP BY clause.

In summary, the above query will return the department name and the average of the employees’ salary in each department where employee name starts with 'S', and round the result to two digits to the right of decimal point. It makes use of the JOIN statement to combine data from both tables, the WHERE clause to filter results, the ROUND function to format the result, and the GROUP BY clause to group results by department_name.

To know more about GROUP BY clause refer to:

https://brainly.com/question/31588970

#SPJ11

Write a program using for loop that calculates and displays the product of all numbers that are multiple of 5 from numbers between 10 and 30.

Answers

The program uses a for loop to iterate over the numbers from 10 to 30. The range function is used to generate a sequence of numbers starting from 10 and ending at 30.

Within the loop, each number is checked using the modulo operator %. The % operator returns the remainder when the number is divided by 5. If the remainder is 0, it means that the number is divisible by 5 and hence a multiple of 5. For each multiple of 5, the program updates the product variable by multiplying it with the current multiple. This way, the product accumulates the multiplication of all the multiples of 5 encountered in the loop.

product = 1

for num in range(10, 31):

   if num % 5 == 0:

       product *= num

print("The product of all numbers that are multiples of 5 from 10 to 30 is:", product)

After the loop finishes, the program prints the final value of the product, which represents the product of all the numbers that are multiples of 5 between 10 and 30.

Learn more about for loops in Python here:

https://brainly.com/question/23419814

#SPJ11

Other Questions
Find the rating level such that the sailors in this rating levelare the youngest in average (smallest average age among all ratinglevels) 10. In a comparative analysis of smart watches, you extracted N messages from a smart watch forum where people discuss three products: Apple Watch, Fitbit Versa and Movado Connect (call this data set A). TO boost the total amount of data, you also extracted an additional N messages posted on an Apple Watch forum, where every post mentions the Apple Watch, and where some but not all posts co-mention the other products (data set B). You want to calculate Lift(Apple Watch, battery) and Lift Movado Connect, battery) with data set A, and also with data set A+B (merging the two data sets). For simplicity assume (1) the proportion of posts mentioning battery is the same for data sets A and B, ) the proportion of Movado Connect posts which also mention battery is the same for data sets A and B, () Lift(Apple Watch, battery) > 1 for data set A. Is Lift(Applewatch, battery), calculated from data set A, GREATER THAN, EQUAL TO, OR LESS THAN (Choose one) Lift(Applewatch, battery) calculated using the combined data set A+B? Justify your response. You can use a numerical example, but must justify using logical arguments or show it mathematically. (10 points) Make a choice below before you provide justification | GREATER THAN || EQUAL TO (LESS THAN Justification: Is Lift(Movado Connect, battery), calculated from data set A, GREATER THAN, EQUAL TO, OR LESS THAN (Circle one) Lift Movado Connect, battery) using the combined data set A+B? Justify your response. You can use a numerical example, but must justify using logical arguments or show it mathematically. (10 points) Make a choice below before you provide justification [ GREATER THAN ( EQUAL TO ( LESS THAN Justification: 12. The minimum magnetic field needed for Zeeman effect to be observed in a spectral line of (400 nm) wavelength when the resolution of the fabry-perot spectrometer is (0.01 nm) is: (me-9.11*10-31 kg, c= 3*108 m/s) B-1.34 T C-2.1 T A-0.73 T D-2.85 T E-3.2 T On June 7th, LinkedOut confirmed that it had experienced a data breach that likely compromised the e-mail addresses and passwords of 6.5 million of its users. This confirmation followed the posting of the password hashes for these users in a public forum.Assume that each stolen password record had two fields in it: [user_email, SHA666 (password+salt), salt] where the salt is 32 bits long and that a user login would be verified by looking up the appropriate record based on user_email, and then checking if the corresponding hashed password field matched the SHA666 hash of the password inputted by the user trying to log in plus the salt. The SHA666 algorithm was written by LinkedOut because "other hashing algorithms were too slow", so they wrote one that was 10x faster than any existing hash algorithm.It was further discovered that the widely used random number generator used to generate the salt was poorly written and only generated 4 possible slats. Given this:What effect does the flaw in the random number generator used have on the security of the LinkedOut scheme?Is the selection of the SHA666 algorithm a good thing or a bad thing? In 1-2 sentences explain why.It turns out that 20% of LinkedOut users with Yahoo Mail e-mail addresses used the same password at LinkedOut as at Yahoo. You learn that, unlike LinkedOut, Yahoo correctly salts its passwords. Should Yahoo be concerned about the LinkedOut breach or not? Explain why Design a Customer class to handle a customer loyalty marketing campaign. After accumulating $100 in purchases, the customer receives a $10 discount on the next purchase. Provide methodsvoid makePurchase(double amount)Boolean discountReached()Provide a test program and test a scenario in which a customer has earned a discount and then made over $90, but less than $100 in purchases. This should not result in a second discount. Then add another that results in the second discount.the wording in this question has me rather confusedplease provide thorough commentsthanks wwWrite code Matlab for trapezoidal and Simpson's 1/3 rulesrad 5 10 15 20 25 30 U BOLO F(x), N 0.0 90 13.0 140 10.5 12.0 5.0 0.50 1.40 0.75 0.90 1.30 1.48 1.50 Filos 0.0000 1.5297 95120 8.7025 2.8087 10881 0.3537 1. Determine if the following statements are propositions. If a statement is a proposition, determine whether it is true or false: (a) Will there be a final exam in this course? a (b) 2x+g < 9 (c) Tomatoes are a fruit and not a vegetable. (d) p = "there exist integers z, y, z such that I x (y + 2) = (x x y) + (x x 2)" (e) Let's take a road trip to any state on the west coast. 1.2 Explain the role of hormonalcontrol in the humanreproductivecycle 2. Name and Email Addresses: Write a program using various functions that keeps names and email addresses in a dictionary as key-value pairs. The program should display a menu [write a function displayMenu] that lets the user to choose from following options: 1. look up and return a person's email address if it exists (write a function lookupEmail], II. add a new name and email address and return the updated dictionary (write a function addEmail], III. change an existing email address and return the updated dictionary [write a function updateEmail] and IV. delete an existing name and email address and return the updated dictionary [write a function deleteEmail). E-mailso What is the principal application layer protocol used ine-mails?o What is the underlaying architecture and transport layer protocolused in emailapplication layer protocol?o Can you list 8Find the linearization of \( f(x, y, z)=x^{2}-x y+3 z \) at the point \( (2,1,0) \). Two deep wells have been installed in Jubail Area. A groundwater sample has been collected from one well. It contains X mg/L of Ca+, 13.5 mg/L of Mg2+, Z mg/L of Al+; 10 mg/L of K*, T mg/L of Fe+, 100 mg/L of Na*, 32 mg/L of CO3 2, Y mg/L of HCO3 and 1.7 mg/L of OH and 107 mg/L of H. Calculate the hardness and alkalinity of the groundwater sample collected from the well. Write a comment regarding the quality of water based on hardness and alkalinity results. (4+4+10+2= 20 marks) Here, X = 103 + 8th digit of your student ID; 25 Design the following application in A) in C++ and B) in Python.Design an application to calculate a) the mean, b) the mode and c) the median of n numbers, with the value of n and the numbers themselves defined by the user. For simplicity let us keep n to be 7. There are three input documents, and their contents are as follows: Doc-1: "The map function that transforms, filters, or selects input data" Doc-2: "The reduce function that aggregates, combines, or collections results" Doc-3: "The map function and reduce function are invoked in sequence" Implement the Map function and the Reduce function to build the Inverted Index/File for these three documents using pseudocode. Describe the concrete inputs/outputs of each phase when building the Inverted Index/File for these three documents using your implemented Map and Reduce functions. Rekha wants to obtain the mean, median and mode of an array of numbers in a function call. List the various options to send and receive data in a function call using C language. Justify your choice with an example. 1) You will create a program that manages employee records. 2) Create a header file (lastname_employeerec.h) that defines an employee data structure (SEMPLOYEE), use typedef to create the sEMPLOYEE data type. The data structure should have the following fields: a. First Name (firstName) b. Last Name (lastName) c. Employee ID (id) d. Start Year (start Year) e. Starting Salary (startSalary) f. Current Salary (currentSalary) 3) Create a library of functions that operate on an array of employee records with a fixed array size determined by a macro named MAX EMPLOYEES, (SEMPLOYEE employees[MAX EMPLOYEES]). The source code for the library functions and the employees array should be in lastname_employeerec.c and the function prototypes should be included in lastname_employeerec.h. The following functions should be in the library: a. void init_employee_records()-initializes the fixed array of employee records by setting the start Year field to 0 for each record; this will indicate an empty record b. void enter_employee_record()-prompts user, through the console, for the employee id (that id determines which array element the data is stored in); then prompts user to enter the data for each field value and writing that field value in the specified array element (determined by id) c. void print employee_records()-prints the data in all of the non-empty employee records (ie., those records where start Year !=0) d. int store employee_records()-stores all of the employee records in a binary format file (employees.dat); returns 0 on SUCCESS, I on FAILURE e. int load_employee_records()- loads all of the employee records from a binary format file (employees.dat); returns 0 on SUCCESS, 1 on FAILURE 4) As you can see from the function prototypes above, the main program does not see how the employee data is stored in memory. This is a design strategy called abstraction. By not exposing the data structure to the user of the library we can change it for better performance, at a later date, without the programs that use the library requiring any changes. We just need to ensure that the function prototypes do not change. 5) Create an application with source code in lastname_main.c that is an employee record management system. The application should give users a menu of choices: 1- enter a new employee record 2-print all employee records 3-store all employee records to a file (employees.dat) 4-load employee records from a file (employees.dat) 5-exit 6) Create a Makefile to build your application: lastname_employee. Your Makefile should be designed so that a source file is compiled only if it has been modified. The PR interval on the ECG is measured from the beginning of the P wave to the beginning of the QRS complex. A normal PR interval is 0.120.20 seconds. In your laboratory subject, the PR interval is determined to be 0.26 seconds. This indicates: a) Myocardial infarction (heart attack) b) AV nodal block c) Hypercalcemia d) Hypocalcemia e) A normal situation Is cholera a microbial disease? If so explain with the followingplease?a. etiology of the disease and characteristics of theetiological agentb. its reservoir and method(s) of transmissionc. patho As a computer systems design engineer in a newly formed technology company, you are required to design a pipelined multiplier unit that can multiply two 32-bit floating point numbers. All the required electronic components are available, but there is one limitation in that, only 8-bit multiplier units are available. By applying the number-splitting concept or principle, and any other appropriate concepts or principles, illustrate how you can design the required pipelined 32-bit number multiplier unit. A metal pipe (ID: 20 cm, friction factor: 0.012) is used to deliver cooling water (10oC) from Tank A (elevation: 250 m) to Tank B (elevation: 275 m). Both tanks are cylindrical and have the same bottom diameter of 20 m). The head space pressures of Tank A and Tank B are 15.1 psia and 14.8 psia, respectively. The total pipe length is 2000 m, with two wide-open angle valves in between. The minor loss coefficients involved are 0.5 (pipe entrance), 5.0 (angle valves), and 1.0 (pipe exit). To deliver water at 200 GPM, how much energy (in kWh) will the pump most approximately consume in 12 hours if the pump efficiency is 85%?32.6 kWh45.1 kWh38.4 kWh57.9 kWh