USING C++ HOW TO FIX OR MAKE THIS FUNCTION WORK PROPERLY
IT SHOULD ADD 2% TO THE SALARY FOR OVER TIME. USING C++ HOW TO FIX OR MAKE THIS FUNCTION WORK PROPERLY
IT SHOULD ADD 2% TO THE SALARY FOR OVER TIME

Answers

Answer 1

The function calculate Salary takes two parameters: base Salary (the base salary of an employee) and overtime Hours (the number of overtime hours worked).

Inside the function, we declare a variable overtime Rate and set it to 0.02, representing a 2% overtime rate.We then calculate the overtime Pay by multiplying the base Salary with the overtime Rate and overtime Hours.Finally, we calculate the total Salary by adding the base Salary and overtime Pay together and return it.In the main function, we prompt the user to enter the baseSalary and overtimeHours.We call the calculate Salary function with the user-provided values and store the result in the total Salary variable.We print the total Salary to display the final result.

To fix the function and make it add 2% to the salary for overtime, you can modify the code as follows:

#include <iostream>

double calculate Salary(double baseSalary, int overtimeHours) {

   double overtimeRate = 0.02;  // 2% overtime rate

   double overtimePay = baseSalary * overtimeRate * overtimeHours;

   double totalSalary = baseSalary + overtimePay;

   return totalSalary;

}

int main() {

   double baseSalary;

   int overtimeHours;

   // Get input from the user

   std::cout << "Enter base salary: ";

   std::cin >> baseSalary;

   std::cout << "Enter overtime hours: ";

   std::cin >> overtimeHours;

   // Calculate and display the total salary

   double totalSalary = calculateSalary(baseSalary, overtimeHours);

   std::cout << "Total salary: " << totalSalary << std::endl;

   return 0;

}

Learn more about overtime Hours Here.

https://brainly.com/question/13349617

#SPJ11


Related Questions

Write a C function that configures the ADC module to convert a 2V value of a signal into a digital value. Consider that the signal range is from OV to 2.5V and it is connected to channel 3. The result must be left justified. Consider a Fosc = 4 MHz.

Answers

The C function configures the ADC module to convert a 2V signal value into a digital value. It sets the voltage reference to VDD, selects the appropriate ADC channel, adjusts the acquisition time and conversion clock settings, and specifies the result format as left-justified. The function ensures that the ADC is turned on and ready for conversion.

Here is a C function that configures the ADC module to convert a 2V signal value into a digital value, assuming a signal range from 0V to 2.5V connected to channel 3, and the result is left-justified. The function takes into account a Fosc (oscillator frequency) of 4 MHz.

#include <xc.h>

void configureADC() {

   // Configure ADC module

   

   // Set ADC voltage reference to VDD

   ADCON1bits.VCFG = 0;

   

   // Select ADC channel 3

   ADCON0bits.CHS = 0b00011;

   

   // Set ADC acquisition time to 20 TAD

   ADCON2bits.ACQT = 0b101;

   

   // Set ADC conversion clock to Fosc/32

   ADCON2bits.ADCS = 0b010;

   

   // Set ADC result format to left-justified

   ADCON2bits.ADFM = 1;

   

   // Turn on ADC module

   ADCON0bits.ADON = 1;

}

This function configures the ADC module by setting the voltage reference to VDD, selecting the ADC channel 3, setting the acquisition time to 20 TAD (conversion cycles), configuring the conversion clock to Fosc/32 (where Fosc is the oscillator frequency), setting the result format to left-justified, and turning on the ADC module.

To learn more about signal: https://brainly.com/question/31634149

#SPJ11

Use MATLAB ONLY to find the smallest eigenvalue and the corresponding eigenvector a) Improve this code by changes this code from power method into inverse method to find the smallest eigenvalue and th

Answers

In MATLAB, you can find the smallest eigenvalue and its corresponding eigenvector by calculating the inverse of the matrix and then determining the eigenvalues and eigenvectors of the inverse matrix.

To find the smallest eigenvalue and corresponding eigenvector of a matrix in MATLAB using the inverse method, you can follow these steps:

Load or define the matrix for which you want to find the eigenvalues and eigenvectors. Calculate the inverse of the matrix using the inv() function. Use the eig() function to calculate the eigenvalues and eigenvectors of the inverse matrix. Extract the smallest eigenvalue and its corresponding eigenvector from the results. Here's an example code snippet:% Define or load the matrix

A = [2 1; 1 3];

% Calculate the inverse of the matrix

A_inv = inv(A);

% Calculate the eigenvalues and eigenvectors of the inverse matrix

[eigenvectors, eigenvalues] = eig(A_inv);

% Find the smallest eigenvalue and its corresponding eigenvector

[min_eigenvalue, min_index] = min(diag(eigenvalues));

smallest_eigenvector = eigenvectors(:, min_index);

% Display the smallest eigenvalue and its corresponding eigenvector

disp('Smallest Eigenvalue:');

disp(min_eigenvalue);

disp('Corresponding Eigenvector:');

disp(smallest_eigenvector);

This code calculates the inverse of the matrix A, then finds the eigenvalues and eigenvectors of the inverse matrix. Finally, it extracts the smallest eigenvalue and its corresponding eigenvector from the results and displays them. By using the inverse method, you can improve the code to find the smallest eigenvalue and eigenvector of a matrix in MATLAB.

Learn more about matrix  here:

https://brainly.com/question/29975358

#SPJ11

For all questions below please send over all the files used and supporting documentation, zipped up if necessary 1. TELCO Python/PowerBI Sentiment Analysis - fetch a TELCO dataset from Kaggle or another source with at least one unstructured feature (e.g. product review / customer feedback). Carry out Natural Language Processing on this field and generate a few (3-4) sentiment metrics. Present these visually in a PowerBI view.

Answers

TELCO is an acronym for a telecommunications company, so you would need to find a dataset that pertains to customer feedback or reviews for a telecommunications company.

You would then have to use Python to carry out Natural Language Processing on this dataset, generate sentiment metrics and present these visually in a PowerBI view.

Natural Language Processing (NLP) is an AI application area that deals with communication between computers and human (natural) languages.

Python is a programming language that provides several libraries for Natural Language Processing such as NLTK, TextBlob, spaCy, Gensim, Pattern, and Stanford CoreNLP.

You would need to use one of these libraries to carry out Natural Language Processing on your dataset.

Power BI is a suite of business analytics tools that deliver insights throughout your organization.

Power BI connects to many data sources including Excel, SharePoint, Dynamics 365, and databases.

You would use Power BI to create visualizations and reports from your dataset.

You can use Power Query to transform the data, and Power Pivot to create the data model, Power View, Power Map, and Power Q&A to create interactive visualizations.

You can also use R or Python in Power BI to extend your data models and reports.

Know more about TELCO  here:

https://brainly.com/question/28551792

#SPJ11

(a) In no more than 80 words, discuss how to determine if a mobile web app is an adaptive mobile website or a dedicated mobile website. (b) Give one example and provide with the URLs corresponding to

Answers

(a) To determine if a mobile web app is adaptive or dedicated, check if app adjusts its layout and functionality based device's capability (adaptive) or if it has separate version specifically designed for mobile device (dedicated).

(b) An example of an adaptive mobile website is "Amazon.com" (URL: amazon.com), which adjusts its layout and features based on user's device.

Examine a mobile web app's behaviour and features to identify whether it is an adaptable mobile website or a dedicated mobile website. A responsive experience is offered by adaptive mobile websites, which change their appearance and content according to the capabilities and screen size of the device. On the other hand, dedicated mobile websites are created especially for mobile devices and may have unique URLs or subdomains. To determine if an app is dedicated or adaptable, examine its URL structure, device-consistent design, and features like touch gestures and device-specific functionality.

Learn more about website here:

https://brainly.com/question/29032371

#SPJ11

The Switch 1 on the Multi-Function Shield is connected to which pin? O a. PC1 O b. PD1 O c. PBO O d. PB1

Answers

Switch 1 on the Multi-Function Shield is connected to pin PD1.

The Multi-Function Shield is a hardware module that provides additional functionality to microcontrollers or development boards. It typically consists of various switches, buttons, LEDs, and other components that can be used for input/output operations.

In this case, the question asks specifically about Switch 1 on the Multi-Function Shield and its corresponding pin. Based on the options provided:

a. PC1

b. PD1

c. PBO

d. PB1

Among these options, the correct answer is b. PD1. PD1 refers to Pin D1, which is the pin to which Switch 1 on the Multi-Function Shield is connected. It is important to consult the documentation or pinout diagram specific to the Multi-Function Shield being used to confirm the exact pin assignments and connections.

Learn more about microcontrollers  here :

https://brainly.com/question/31856333

#SPJ11

3. Why is the Simple Reflex Agent considered as the simplest kind of agent?

Answers

A Simple Reflex Agent is considered the simplest kind of agent because it only responds to the current percept, which is the input received at any given instance of time, without having any information about the past.

It doesn't have any memory of what happened before, which makes it incapable of making decisions based on the sequence of events that led to the current situation.

In this type of agent, a rule base is used to interpret the percept and generate the appropriate action. These rules are very basic and are only based on the current state of the environment. The agent has no knowledge of the past or what will happen in the future.

A Simple Reflex Agent can be described as a stimulus-response system where the stimulus is the current percept, and the response is the action taken in response to that percept. The agent cannot learn from its environment or modify its behavior based on experience. Its behavior is solely determined by the rules provided in its rule base.

Overall, a Simple Reflex Agent is considered the simplest type of agent because of its limited capabilities. It can only take action based on the current percept and cannot modify its behavior based on previous experiences. It lacks memory and cannot learn from its environment, making it less effective in complex environments that require decision making based on past experiences.

To know more about Simple Reflex Agent, visit:

https://brainly.com/question/32905506

#SPJ11

Consider a case where some servers require more contact with
the outside internet than most systems belonging to a company. How
can a company use firewalls to provide appropriate levels of
protection

Answers

A company can use firewalls to provide appropriate levels of protection for servers that require more contact with the outside internet than other systems.

Firewalls play a crucial role in network security by controlling and monitoring incoming and outgoing network traffic. In the case where certain servers within a company require more contact with the outside internet, firewalls can be employed to enforce specific rules and policies to ensure appropriate protection levels.

Firstly, the company can implement a network segmentation strategy by dividing its internal network into different security zones. This allows for the creation of separate network segments for servers that require more internet contact. Firewalls can be deployed at the boundaries of these segments to regulate traffic flow and enforce access controls. By isolating these servers, the company can limit their exposure to potential threats while still allowing necessary communication with external systems.

Secondly, the company can configure the firewalls to implement stricter security policies for the servers in question. This can include defining specific rules to allow only authorized protocols and services, monitoring network traffic for any suspicious activity, and implementing intrusion detection and prevention mechanisms. By customizing firewall settings based on the unique requirements of these servers, the company can provide a higher level of protection while maintaining connectivity to the outside internet.

Lastly, regular monitoring, updating, and patching of the firewalls is essential to ensure the effectiveness of the security measures. Firewall configurations should be reviewed and updated periodically to adapt to evolving threats and changes in server requirements. Ongoing monitoring and analysis of firewall logs can help identify any anomalies or potential security breaches, allowing for timely response and mitigation.

In conclusion, utilizing firewalls as a part of a comprehensive network security strategy enables a company to provide appropriate protection levels for servers with increased internet contact. By implementing network segmentation, configuring specific security policies, and ensuring regular maintenance and monitoring, the company can enhance security while enabling necessary communication with the outside world.

Learn more about firewalls

brainly.com/question/31753709

#SPJ11

java
Q4. Write a function, named area T, to compute the area of a triangle. The function must return the area of the triangle. The function must take two input parameters: base and height of the triangle.

Answers

Java code to calculate the area of a triangle: public class Triangle Area {  public static void main(String[] args) {    double base = 5.0;    double height = 3.0;    double area = area T(base, height);    System. out.println("The area of the triangle is: " + area);  }  public static double area T(double base, double height) {    double area = 0.5 * base * height;    return area;  }}

The above code contains a method called `area T` which calculates and returns the area of a triangle using the input parameters `base` and `height`. The formula for calculating the area of a triangle is 0.5 * base * height.

The `main` method of the program is used to test the `area T` method by calling it with some sample values for the `base` and `height` of a triangle. The result is then printed to the console.

To know more about Triangle Area refer for :

https://brainly.com/question/17335144

#SPJ11

Suppose we have a byte-addressable computer using 2-way set associative mapping with 16-bit main memory addresses and 32 blocks of cache. If each block contains 8 bytes, determine the size of the tag field.

Answers

Total bits used as the block offset field = 3 bitsTotal bits used as the set offset field = 4 bitsSo, the total bits used by the offset fields are 3 + 4 = 7 The remaining bits for the tag field are= 16 – 7= 9 Thus, the size of the tag field is 9 bits.

The problem is based on the 2-way set associative mapping in a byte-addressable computer. There are 16-bit main memory addresses and 32 blocks of cache, with each block containing 8 bytes. We need to find out the size of the tag field.The size of the block is 8 bytes Number of Blocks, 32 Number of sets in the cache is given by;Number of sets

= Total number of Blocks / Associativity

= 32 / 2

= 16 Number of bits required for block offset field

= log2 (block size)

= log2 (8)

= 3 bits Number of bits required for set offset field

= log2 (Number of sets)

= log2 (16)

= 4 bits The remaining bits will be used as the tag field.Total bits in main memory address

= 16 bits .Total bits used as the block offset field

= 3 bitsTotal bits used as the set offset field

= 4 bitsSo, the total bits used by the offset fields are 3 + 4

= 7 The remaining bits for the tag field are

= 16 – 7

= 9

Thus, the size of the tag field is 9 bits.

To know more about bits visit:

https://brainly.com/question/30273662

#SPJ11

Consider a partition P = {S₁, S₂, .... Sn} of a set V. Check all operations on the partition P that will produce another partition of the same set V. None of these answers ✓ Replace in P some elements S₁, S; with their unions S; U Sj. ✔ Add a some singleton from V. Remove some element S; Replace in P some elements Si, Sj with their intersections S; S;

Answers

The operations on the partition P that will produce another partition of the same set V are:

1. Replace in P some elements Sᵢ, Sⱼ with their intersections Sᵢ ∩ Sⱼ.

2. Add a singleton from V.

3. Remove some element Sᵢ.

A partition of a set V is a collection of subsets of V that are pairwise disjoint and whose union is V. In other words, every element in V belongs to exactly one subset in the partition.

1. Replace in P some elements Sᵢ, Sⱼ with their intersections Sᵢ ∩ Sⱼ:

When we take the intersection of two subsets in the partition, we create a new subset that contains only the elements that are common to both subsets. This new subset will still be a subset of V, and the other subsets in the partition remain unchanged. Therefore, this operation preserves the properties of a partition.

2. Add a singleton from V:

Adding a singleton, which is a subset containing only one element, to the partition will not affect the disjointness property because the new subset will not overlap with any existing subsets. The union of all subsets in the new partition will still be V, as the singleton contains an element from V. Hence, this operation also produces a valid partition.

3. Remove some element Sᵢ:

If we remove an entire subset from the partition, the remaining subsets still form a collection of disjoint subsets whose union is V. The removal of one subset does not affect the disjointness property or the fact that the union of all subsets is V. Therefore, this operation results in a valid partition.

Learn more about intersection

brainly.com/question/12089275

#SPJ11

Question 12 3 pts Write the pseudocode (including the full and correct method header) in the answer space for a recursive function that takes only an integer N as a parameter and returns the result of the following mathematic progression: 1 + 1/2 + 1/3 + 1/4 + + 1/(n-2) + 1/(n-1) + 1/n

Answers

The recursive function, named `calculateSum`, takes an integer N as a parameter and returns the sum of the given mathematical progression: 1 + 1/2 + 1/3 + ... + 1/(N-1) + 1/N.

Pseudocode:

```

function calculateSum(N):

   if N == 1:

       return 1

   else:

       return 1/N + calculateSum(N-1)

```

The recursive function `calculateSum` is defined with an integer parameter `N`. The base case is when `N` is equal to 1, in which case the function simply returns 1, representing the first term of the progression.

For values of `N` greater than 1, the function recursively calculates the sum of the progression. It does this by adding the reciprocal of `N` (1/N) to the sum of the progression for `N-1`. This is achieved by invoking the function `calculateSum` with the parameter `N-1`.

The recursion continues until the base case is reached (N equals 1), at which point the recursive calls start returning their values and the final sum is obtained.

By utilizing recursion, the function effectively calculates the sum of the given mathematical progression in a concise and elegant manner.

Learn more about Pseudocode here:

https://brainly.com/question/17102236

#SPJ11

Mask to extract mantissa (fraction part from float (32-bit) is Ox00 EF FF FF O True O False Question 26 critical section needed in threading O True O False Question 27 critical section is needed in locking O True False

Answers

1. The mask to extract the mantissa (fraction part) from a 32-bit float is 0x00FFFFFF. The answer to question 26, "Critical section is needed in threading," is True. The answer to question 27, "Critical section is needed in locking," is True

In a 32-bit float representation, the bits are typically divided into three parts: sign, exponent, and mantissa. The mantissa represents the fractional part of the floating-point number. To extract the mantissa, we need to mask out the bits corresponding to the sign and exponent while preserving the bits representing the mantissa. The mask 0x00FFFFFF is a 32-bit mask where the first 8 bits are set to 0, allowing us to extract the 24 bits representing the mantissa.

2. The answer to question 26, "Critical section is needed in threading," is True.

A critical section refers to a section of code that should not be executed simultaneously by multiple threads in a concurrent program. It is necessary to ensure thread safety and prevent race conditions, where multiple threads access shared resources concurrently and potentially produce incorrect results. By marking a section of code as a critical section, only one thread can execute that section at a time, while other threads must wait for their turn. This synchronization mechanism helps maintain the integrity of shared data and ensures correct execution in a multi-threaded environment.

3. The answer to question 27, "Critical section is needed in locking," is True.

Locking is a synchronization mechanism used to protect critical sections of code in a concurrent program. By acquiring a lock, a thread can ensure exclusive access to the critical section, preventing other threads from executing it simultaneously. The use of locking is essential to prevent race conditions and maintain thread safety. When a thread acquires a lock, it enters the critical section and executes the code, while other threads that require the same lock are blocked until the lock is released. This ensures that only one thread can access the critical section at a time, preventing data inconsistencies and conflicts. Therefore, critical sections often require the use of locking to provide proper synchronization in concurrent programming.

To know more about float refer to:

https://brainly.com/question/27490687

#SPJ11

What type of sequential circuit systems coordinate signals and control data movemen synchronous controlled machine O asynchronous controlled machine O finite state machine. O infinite state machine

Answers

The type of sequential circuit system that coordinates signals and controls data movement is a finite state machine (FSM).

A finite state machine (FSM) is a type of sequential circuit system that coordinates signals and controls data movement. It consists of a finite set of states, transitions between states, and input/output signals.

The behavior of the FSM is defined by a set of rules that determine how it responds to input signals and transitions between states. The FSM operates synchronously, meaning that it changes its state and outputs in response to clock signals or other timing mechanisms.

It is called "finite" because it has a limited number of states, which allows for efficient design and analysis. The FSM is widely used in various applications, including digital logic design, control systems, and communication protocols.

Learn more about sequential circuit

brainly.com/question/31676453

#SPJ11

This assignment requires you to create design documentation for a program of your choice, which in some way combines searching, the color red, and your student id.
Your program must:
Be challenging for you, so that you are able to demonstrate your problem-solving skills.
Require you to use a variety of problem-solving strategies/techniques to complete.
Be creative.
Include behavior that you can attempt to code later using Scratch v3, and be within the capabilities of Scratch v3. You may not use any other programming environment for this assignment.
design dcomentation:
A LIST OF POTENTIAL IDEAS
EXPLANATION FOR THE REASON OF THE CHOSEN IDEA
A LIST OF REQUIREMENTS
SKETCH OF THE IDEA
ALGORITHMS TO IMPLEMENT ALL THE BEHAVIOR

Answers

The program that has been designed in the design documentation combines searching, the color red, and the student ID. This program is designed to meet the requirements of the user, and the algorithms that have been implemented will help in achieving the desired behavior.

The first requirement of the program is that it should have a user-friendly interface. This means that the user should be able to navigate through the program without any difficulty. Additionally, the program should have a search feature that allows the user to search for specific items or information. The search feature should be efficient and should return accurate results. Moreover, the program should incorporate the color red as a prominent color to make it visually appealing. The algorithms that have been implemented to achieve the desired behavior of the program include the use of binary search, linear search, and hashing. Binary search is used to search for an item in a sorted list, and it is an efficient algorithm.

Linear search, on the other hand, is used to search for an item in an unsorted list. Hashing is used to map keys to values in a way that makes it easy to retrieve values when the key is known. In conclusion, the design documentation for the program that combines searching, the color red, and the student ID has been developed to meet the requirements of the user. The program has a user-friendly interface, a search feature that returns accurate results, and the color red has been used to make it visually appealing. The algorithms that have been implemented include binary search, linear search, and hashing, which help in achieving the desired behavior of the program.

Know more about design documentation, here:

https://brainly.com/question/30159795

#SPJ11

Describe and explain in detail how ASA Firewalls filter traffic
by default.

Answers

ASA firewalls filter traffic by default as it passes through the security appliance. The filtering process is based on security levels, access control lists (ACLs), and inspection rules.Security LevelsTraffic flow on ASA firewalls is based on security levels. Security levels indicate the degree of trustworthiness of a network.

The level of security ranges from 0 to 100, with 100 being the most secure and 0 being the least secure. The security level assigned to an interface is used to define the direction of traffic flow between interfaces. In general, traffic is allowed to flow from an interface with a higher security level to an interface with a lower security level. However, to restrict this flow, an ACL must be applied to the lower security interface.Inspection RulesInspection is a process that allows the ASA firewall to inspect traffic, both inbound and outbound. Inspection rules are preconfigured on the ASA firewall, and they are used to identify and control the traffic flow based on different protocols.

Inspection rules are also used to identify the type of application that is being used, and to identify traffic patterns that could indicate an attack. This information can then be used to make decisions about which traffic to allow or deny.ACLsACLs are used to control traffic flow based on source and destination IP addresses, as well as port numbers. ACLs are configured on the ASA firewall and can be used to permit or deny traffic.

ACLs are created using the access-group command and can be applied to either inbound or outbound traffic. ACLs can also be used to permit or deny specific types of traffic based on protocol. For example, an ACL could be created to allow only HTTP traffic to a specific server.The above are the ways ASA firewalls filter traffic by default.

To know more about ASA firewalls filter traffic visit:

https://brainly.com/question/32367145

#SPJ11

How do we partition in Scheme for quicksort? => (partition '5 '(1 3 5 7 9 8 6 4 2)) should return ((1 3 4 2) (5 7 9 8 6)

Answers

Quicksort is a divide-and-conquer sorting algorithm that uses recursion to sort a list. It divides the list into smaller sub-lists and then sorts the sub-lists.

In Scheme, we can partition the list in quicksort as follows:```
(define (quicksort lst)
   (cond ((null? lst) '())
         (else (let ((pivot (car lst)))
                 (append (quicksort (filter (lambda (x) (< x pivot)) lst))
                         (list pivot)
                         (quicksort (filter (lambda (x) (>= x pivot)) lst)))))))
(define (partition x lst)
 (let ((smaller (filter (lambda (y) (< y x)) lst))
       (larger (filter (lambda (y) (>= y x)) lst)))
   (list smaller larger)))
```
So, `(partition '5 '(1 3 5 7 9 8 6 4 2))` will return `((1 3 4 2) (5 7 9 8 6))`.

To know more about Quicksort visit:
https://brainly.com/question/30901570

#SPJ11

Assume that there is a company named ABC. ABC needs a chat server for their employee's internal usage. There should be a GUI based chat client -not a web based-. When an employee run the chat client for the first time, chat client have to register itself to the chat server by using her/his mail address -as a user name-, setting a password for logon. But the chat server have to validate the user is correct. You may use the Database -Employee info- containing Employees name, surname, mail address, citizenship information etc. that is already exist in the company -assume this and prepares a db-. So, for the employee registration, you can use these information. Via the Chat Client, employees can do the below operations 1. See who is active on the Chatserver 2. Send a private message to a specific person 3. Send a general message to all active person The system must record the activities below. 1. All messages in 1-1 and 1-many chats 2. Activities time for a user's A user called "superuser" can access/see the logs via a backdoor which is not a normal user can access. For the chat server, you should develop a custom server and for the accessing to Employee information, logging the activities etc, you must do these actions via a Web Service -not via a direct Database query-. Encryption between client and server or the servers has to be supported. It can be activated by a command and/or switch. Create a One-Page documentation file as "document.pdf" containing summary of your project details, design, components etc. Upload only your project file(s) as "project.zip" Start a video/audio capturing tool on a host/client (your voice telling what you are testing during the demo) 1. Start your server(s), client(s), web services -if exist- or others 2. Run "netstat" and shows your server is listening of your server port 777. 3. Start Client app on at least 2 users(s) 4. Start Wireshark network captures 5. Show the 1-1 chars, 1-many chats, who is active etc commands. 6. Stop Wireshark network capture and show the traffics/messages between client, server, web service etc. Save the recording file as "recording-demo.xxx" as in a playable video format in a default apps in any OS. Recoding should be max 7 mins.

Answers

The ABC company needs a chat server for internal use of its employees. The chat client should be GUI-based. For the first time, when an employee runs the chat client, it should register itself to the chat server using their email address as a username and set a password for login.

The chat server must validate that the user is correct. The database -Employee info- that already exists in the company, which contains the employee's name, surname, mail address, citizenship information, etc., can be used to register employees.

The system should record all messages in 1-1 and 1-many chats and the activities time for a user. A superuser named "superuser" can access/see the logs via a backdoor, which is not accessible to normal users. To develop the chat server, a custom server must be created. Accessing employee information, logging activities, etc., must be done through a web service, not directly from the database. The client-server encryption must be supported and can be activated by a command and/or switch.

To know more about company visit:

https://brainly.com/question/30532251

#SPJ11

Problem 1 (50 pts): Construct the formal description of the PDA for the following language L= {w|#a's=#b's and we{ab}" }

Answers

A pushdown automaton (PDA) can be used to describe the language L= {w|#a's=#b's and we{ab}}"}.Here, the number of a's in a string should be equal to the number of b's, and the string should start with an 'a' and end with a 'b'.

The PDA will function as follows:We use two symbols, 'Z' and 'X', for the initial stack symbol, and 'X' is used as the auxiliary symbol. The transitions are as follows:• q0, a, Z → q1, XZ• q1, a, Z → q1, XX• q1, b, X → q2, X• q2, b, X → q2, X• q2, λ, Z → q3, ZIn the initial state, the PDA starts by pushing the auxiliary symbol onto the stack. The automaton reads the input and pushes 'X' onto the stack each time it reads an 'a'. When it reads a 'b', it pops an 'X' from the stack. The automaton moves to the final state after reading the entire input, which verifies that the stack is empty.

If it is not empty, the automaton rejects the input.To construct the formal description of the PDA for the given language, the initial state is q0, the set of accepting states is {q3}, and the input alphabet is {a, b}. The stack symbols include {Z, X}. Finally, the formal description of the PDA is as follows:M = (Q, Σ, Γ, δ, q0, Z, F) where,Q = {q0, q1, q2, q3}Σ = {a, b}Γ = {Z, X}δ is the transition function, defined by the following set of rules:δ(q0, a, Z) = {(q1, XZ)}δ(q1, a, Z) = {(q1, XX)}δ(q1, b, X) = {(q2, λ)}δ(q2, b, X) = {(q2, λ)}δ(q2, λ, Z) = {(q3, Z)}q0 is the initial stateZ is the initial stack symbolF = {q3} is the set of accepting states.

To know more about automaton visit:

https://brainly.com/question/32227414

#SPJ11

Which of the following is a system of ethics? Select one: O a. All of these. O b. Utilitarianism O c. Divine Command Theory O d. Relativism

Answers

The answer to the question is b. the best action is one that provides the greatest amount of pleasure and the least amount of pain for the greatest number of people.

Utilitarianism. Utilitarianism is a system of ethics that argues that the best action is the one that maximizes overall happiness or pleasure.

Utilitarianism focuses on the outcomes of a given action, rather than the inherent morality of the action itself. The theory is based on the idea that humans are driven by pleasure and the avoidance of pain. Therefore, the best action is one that provides the greatest amount of pleasure and the least amount of pain for the greatest number of people.

To know more about Utilitarianism, visit:

https://brainly.com/question/28148663

#SPJ11

Problem 1 [10 points] Write a program that reads a text file with numbers and displays (on the screen) the averages of negative and non-negative numbers. Your program should obtain the file name from the user as a command line argument. Assume that there is one number per line in the text file. Note that the numbers in the file can be of any data type (i.e., int, float, etc.). Notes: Your java files must follow the naming conventions specified below: Problem 1: Averages.java Properly comment your code wherever necessary. [This section carries points too]

Answers

The arguments are passed as a space-separated list of strings after the name of the program on the command line. To obtain the command-line arguments, the main method of the program should have a parameter of type String array. This array will contain the command-line arguments passed to the program.

Problem 1: Averages.javaThis problem is related to programming in Java language. It requires the implementation of a program that can read a text file with numbers and display on the screen the average of negative and non-negative numbers. The user should provide the file name as a command-line argument. The text file contains numbers of any data type (int, float, etc.), with one number per line.

The program can be implemented by following the steps given below:1. The program must obtain the file name from the user as a command-line argument.2. The program must open the file and read it line by line. For each line, it should determine if the number is negative or non-negative.3. The program must keep track of the sum and count of negative and non-negative numbers separately.4. After the program has read all the lines in the file, it should calculate the averages of negative and non-negative numbers.5.

The program should display the averages on the screen.The program should be properly commented wherever necessary to explain the purpose of each statement. Following the naming conventions specified below, Java files must be properly named:Problem 1: Averages.javaCommand-line arguments are a way to pass input data to a program when it is run.

To know more about command line visit :

https://brainly.com/question/32270929

#SPJ11

Imagine you are tasked with evaluating the Administrative Processes involved in hiring new employees within your organization. During a Security Risk Assessment, you identify that your organization does not have a policy
which requires conducting background checks on applicants for hire. Determine whether or not this is a risk and explain why or why not.

Answers

The absence of a policy that requires conducting background checks on applicants for hire is a risk. The hiring of new employees involves risks of financial loss, theft, fraud, workplace violence, and other criminal activity.

Background checks are critical to avoid making a bad hire, to mitigate risks and losses, and to enhance the safety and security of the organization.

A policy that requires conducting background checks on applicants for hire will help identify applicants who have a criminal history, who are unqualified for the position, or who pose a risk to the organization. The policy will help ensure that applicants have the required qualifications, experience, and credentials. It will also verify the accuracy of information provided by applicants on their resumes and job applications.

To know more about policy visit:

https://brainly.com/question/31951069

#SPJ11

5- List all person data when Title is 'available' and when Title is 'not available, for the person's name is 'Wood'. (Person Schema, Person Table) (Two separate queries)

Answers

Two separate queries are required to be used to list all person data when Title is 'available' and when Title is 'not available, for the person's name is 'Wood'.

The following is the main answer to the question:
1) List all person data when Title is 'available' for the person's name is 'Wood':
SELECT * FROM Person WHERE Name = 'Wood' AND Title = 'available';
2) List all person data when Title is 'not available' for the person's name is 'Wood':
SELECT * FROM Person WHERE Name = 'Wood' AND Title != 'available';

two separate queries are required to be used to list all person data when Title is 'available' and when Title is 'not available, for the person's name is 'Wood' respectively. Person Schema and Person Table are used in the given question. Here is the code for the two separate queries: The first query selects all the data from Person table where Name is 'Wood' and Title is 'available'. The second query selects all the data from Person table where Name is 'Wood' and Title is not 'available'. Therefore, this will exclude all the data with Title as 'available' for the person's name 'Wood'.

Two separate queries are required to be used to list all person data when Title is 'available' and when Title is 'not available, for the person's name is 'Wood'.

To know more about Wood visit:

brainly.com/question/10967023

#SPJ11

ONLY USE sdtio.h
Please DO NOT use
stdlib.h
time.h
iostream
Array Part a) Use array convention to read these numbers. The following numbers are read from console by using "scanf" and for loop: 11, 2, -3, 7,-5, -4,0 Part b) Find the average of only negative numbers *HELP: declare a variable "count=0" to find out how many numbers are negative

Answers

To find the average of only negative numbers using only sdtio.h, you can use a for loop to read the input from the console using scanf and then use an array to store the input. You can then calculate the average of only negative numbers by counting the number of negative numbers and dividing the sum of negative numbers by the count.

You can use the for loop to read the input from the console using scanf and then use an array to store the input. You can then calculate the average of only negative numbers by counting the number of negative numbers and dividing the sum of negative numbers by the count. In this case, we will use a variable "count" to find out how many numbers are negative and then divide the sum of negative numbers by the count. To get the sum of negative numbers, we will loop through the array and add all negative numbers to the sum.

In conclusion, the average of only negative numbers can be found by reading the input from the console using scanf and then storing it in an array. Then, using a for loop to count the number of negative numbers and calculating their sum, we can find the average of negative numbers using only sdtio.h.

To know more about array visit:
https://brainly.com/question/13261246
#SPJ11

Which of the following biometrics offers the strongest
authentication in terms of uniqueness of end-user attributes:
Retinal Scan
Keystroke Dynamics
Voice Recognition
Facial Recogn

Answers

Biometric authentication is a security process that allows computer users to log in to their computer systems with their unique biological characteristics such as fingerprints, facial scans, and voice recognition. The main aim of biometric authentication is to prevent unauthorized access to computer systems.


In terms of uniqueness of end-user attributes, the retinal scan offers the strongest authentication among the following biometrics. A retinal scan is a biometric technique that uses the unique patterns on the retina of the eye to authenticate users.

Keystroke dynamics is a behavioral biometric authentication method that involves analyzing the way a user types on a keyboard. This method is not as unique as the retinal scan because people may share similar typing patterns.

Voice recognition is a biometric authentication method that analyzes the unique characteristics of a user's voice, including pitch, tone, and cadence. This method is not as strong as the retinal scan because people may imitate or mimic someone else's voice.

Facial recognition is a biometric authentication method that uses a camera to capture a user's face and analyzes the unique features of the face to authenticate the user. Facial recognition is not as strong as the retinal scan because people may share similar facial features with others.
To know more about computer visit:
https://brainly.com/question/32297640

#SPJ11

ASAP
Question 1 (15 marks) Write a Python program to repeat user input a number. When user enter a number greater than 0 , the number will be added to the queue. The total number that can be stored in queu

Answers

A Python program to repeat user input a number is given below. This program adds the number to the queue if it is greater than 0. The queue can store a total number of 10 elements.

1. Initialize an empty queue using the queue module of Python.

2. Use a while loop to repeat user input and add it to the queue if it is greater than 0.

3. If the queue has reached the maximum capacity, print a message "Queue is full."

4. Use the get() method to remove the elements from the queue.

5. If the queue is empty, print a message "Queue is empty."

Python is a high-level language that is used to develop a wide range of applications. Queues are a type of data structure that allows data to be stored and accessed in a specific order.

In Python, the queue module provides a simple way to create and manipulate queues. In this question, we are asked to write a Python program to repeat user input a number. When the user enters a number greater than 0, the number will be added to the queue.

The total number that can be stored in the queue is limited to 10 elements.

The program uses the queue module of Python to create an empty queue. A while loop is then used to repeatedly ask the user for input. If the user enters a number greater than 0, the number is added to the queue using the put() method. If the queue has reached its maximum capacity, a message "Queue is full" is displayed.

When we need to remove an element from the queue, we use the get() method. If the queue is empty, a message "Queue is empty" is displayed. This program can be useful in a variety of applications where data needs to be stored in a specific order.

To learn more about  Python program

https://brainly.com/question/18836464

#SPJ11

Design a CMOS Hexadecimal 7 segment display decoder
1. Design a CMOS circuit.
2. Implement their design using Verilog (NOTE that you should produce a switch level Verilog implementation using pmos and nmos transistors).
3. Simulate the circuit and verify that the circuit produces the expected output
4. Write a report using the following format:
a. Introduction
b. Theory
c. Description of circuit (includes CMOS circuit diagram and Verilog code)
d. Results
e. Discussion and comments
f. References

Answers

One can make  something called a CMOS decoder that shows numbers on a screen. The decoder changes a 4-digit code into a number or letter that can be shown on a screen with 7 parts.

How do one  Design a CMOS circuit.

One will use a special technology called CMOS to create our design, and then we will use a program called Verilog to test it out. Theory is an idea or set of ideas that explain how something works or why something happens.

CMOS is a type of technology used for making digital circuits. It is popular because it uses less power and is less prone to interference. CMOS logic gates use N-channel and P-channel Metal-Oxide-Semiconductor transistors in a matching way.

You can learn more about CMOS circuit at

https://brainly.com/question/29844432

#SPJ4

A timer can be set to interrupt the computer after a specified period. Deciding how long the timer is to be set for a particular user
A. is a mechanism for ensuring CPU protection
B. is a policy decision
C. is not likely to change across places
D. is not likely to change over time

Answers

A timer can be set to interrupt the computer after a specified period. Deciding how long the timer is to be set for a particular user is a policy decision. So, the correct answer is: B.

Setting the timer for a specified period is a policy decision rather than a mechanism for ensuring CPU protection. The timer duration depends on various factors such as user requirements, system policies, and specific use cases. It is a decision made by administrators or users based on their specific needs, preferences, and the intended purpose of the timer. Different users or systems may have different requirements and thus may set the timer for different durations. Therefore, it is considered a policy decision rather than a mechanism for CPU protection or a fixed value that remains constant across places or over time.

Setting the duration of a timer is a policy decision that depends on specific user needs and system requirements. It is not directly related to CPU protection, and the timer duration can vary across different users, systems, and over time.

To know more about CPU visit-

brainly.com/question/21477287

#SPJ11

java
Question 28 (1 point) One class having its definition built upon another class is known as: Encapsulation Dynamic binding Inheritance Polymorphism

Answers

Inheritance is the correct answer. It is the concept of building a new class from the existing class. When a new class inherits the characteristics of an existing class, it is known as inheritance. This new class is also known as the subclass or child class, and the existing class is known as the superclass or parent class.

In Java, the child class is known as the subclass and the parent class is known as the superclass. Inheritance is a fundamental concept of object-oriented programming that allows code reuse and promotes the creation of classes in a hierarchical manner.

It is a technique that enables us to create a new class from an existing class by inheriting the properties of the existing class. Inheritance allows us to reuse the code and avoid duplication of code. It also enables us to create a more specialized subclass that inherits only the features it needs from the superclass, thus improving the code's readability.

To know more about building visit:

https://brainly.com/question/6372674

#SPJ11

Describe Binary Phase Shift Keying and Quadrature Phase Shift Keying

Answers

Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift Keying (QPSK) are modulation techniques used in digital communication systems.

BPSK is a type of phase shift keying modulation where binary data is represented by the phase of the carrier signal. It uses two phases: 0 degrees and 180 degrees, corresponding to the binary values 0 and 1, respectively. The phase of the carrier signal is shifted based on the input binary data, allowing for efficient transmission of digital information.

QPSK, on the other hand, is a modulation scheme that uses four different phase shifts to represent digital data. It employs four phases: 0, 90, 180, and 270 degrees, corresponding to the four possible combinations of two binary bits (00, 01, 10, and 11). By encoding two bits of data per symbol, QPSK achieves higher data transmission rates compared to BPSK.

In BPSK, each bit is represented by a single phase shift, while in QPSK, two bits are represented by a single phase shift. This difference allows QPSK to transmit twice as much data per symbol compared to BPSK. However, QPSK is more susceptible to errors in the presence of noise and interference due to the smaller phase differences between adjacent symbols.

Both BPSK and QPSK are widely used in various communication systems, including satellite communication, wireless networks, and digital audio and video broadcasting. They provide efficient and reliable means of transmitting digital data over noisy channels.

Learn more about Binary Phase

brainly.com/question/32773702

#SPJ11

Dont write any theoris only math
A computer system contains a main memory of 32KB. It also has a 2KB cache divided into two-lines/set with 8Bytes per line. Assume that the cache is initially empty. The processor fetches words from locations 1024, 1025, 1026…….1072. and then 2048, 2049, 2050, …. 2096 in that order. Calculate the Hit ratio and show the state of cache at the end. Assume an LRU is used as replacement algorithm.

Answers

The term "hit ratio" describes the proportion of cache hits to all memory access operations in a cache system. It is a gauge of how well the cache works to cut down on memory visits to the main memory.

We must examine the memory accesses and cache behaviour based on the supplied data in order to determine the hit ratio and display the state of the cache at the conclusion. We will walk through each memory access step by step in order to ascertain the cache status and hit ratio:

1. Access to memory: 1024

Cache: Empty

State of Cache: [1024, -]

Hit Ratio: 0/1 = 0 (because there was no previous cache access, a miss).

2. Memory Access: 1025 Cache: [1024, -]

State of Cache: [1024, 1025]

0/2 = 0 Hit Ratio

3. Memory Access (1026) Cache (1024, 1025)

State of Cache: (1024, 1025, 1026)

0/3 = 0 hit ratio

4. Memory access (1027) Cache (1024, 1025, 1026)

State of Cache: (1024, 1025, 1026) (Cache full, no need to replace)

0/4 = 0 Hit Ratio

5. Access to memory: 1028

Cache: [1024, 1025, 1026]

State of Cache: (1024, 1025, 1026) (1028 is not in the cache, and the state is unaffected by LRU replacement)

0/5 = 0 hit ratio

6. Memory Access: 1029

Cache: [1024, 1025, 1026]

Cache State: [1024, 1025, 1026] (1029 is not in the cache, LRU replacement doesn't affect the state)

Hit Ratio: 0/6 = 0

7. Memory Access: 1030

Cache: [1024, 1025, 1026]

Cache State: [1024, 1025, 1026] (1030 is not in the cache, LRU replacement doesn't affect the state)

Hit Ratio: 0/7 = 0

8. Memory Access: 1031

Cache: [1024, 1025, 1026]

Cache State: [1024, 1025, 1026] (1031 is not in the cache, LRU replacement doesn't affect the state)

Hit Ratio: 0/8 = 0

9. Memory Access: 1032

Cache: [1024, 1025, 1026]

Cache State: [1032, 1025, 1026] (1024 is replaced by 1032 based on LRU)

Hit Ratio: 0/9 = 0

10. Memory Access: 1033

Cache: [1032, 1025, 1026]

Cache State: [1032, 1033, 1026] (1025 is replaced by 1033 based on LRU)

Hit Ratio: 0/10 = 0

Final Cache State: [1032, 1033, 1034, 1035, 1036, 1037, 1038, 1039]

Hit Ratio: 0/(number of memory accesses)

To know more about Hit Ratio visit:

https://brainly.com/question/14246552

#SPJ11

Other Questions
Please use Java as the languageWrite a method that takes an array of int and returns the median. You will need to make a copy of the array and sort it. Call the method from main passing in a reference to an array of ints that you h In Anaconda - Spyder, in PythonGive the following commands to create a matrix M:>> M = randn(5,10);a. Compute the mean of each column and assign the results to the elements of a vectorcalled avg.b. Compute the standard deviation of each column and assign the results to the elementsof a vector called s.c. Use a for cycle to find the maximum and minimum in the matrix est time isn: 12:07:30 Design simple Common Emitter (CE) configured NPN BJT with varied Vas. Vcc= 10 V. Rg 200 KQ. Rc5 KQ. Vec 07 V. and assume B= 100 Find out the mode of operation of the designed transistor at (i) VBB 2 V and (ii) VBB 4 5 V Which of the following behaviors of effective team members would primarily assist in maintaining healthy psychological and interpersonal dynamics? Select an answer and submit. For keyboard navigation, use the up/down arrow keys to select an answer. a cooperating b coordinating communicating d comforting Describe two issues that you, as a developer, might encounterwhen having to balance the different needs of the variousstakeholders that might be involved in your development project.Provide a ratio Write a C program that works as described below and prints the desired messages as desired:Note: to start with 4 and 5. You can base the example shown in the lessons.After the program starts , it should only show >> (do not print other messages.):>>Then start the user's command with a new processi fork to run it with the exec family system call and have the parent process wait until this process is finished.If the command that the user entered was not found when running the command, that is, if the exec function fails:Because this error may be caused by path, use the exec family function to find the path of this command with one of the following commands. For example, if you want to be found 'ls'$ which ls$ whereis ls$ command -v ls (not: alias oldugunda pathi vermiyor)If the given program name is in the current path, then run the program again using the current path.$ pwd ile current pathi bulabilirsiniz$ locate -w path/name yadaYou can still make different combinations: $ locate -b basename | fgrep -w pathIf it is not a current path and is not defined in the system path, that is, both a.i and a. Ii, if it has given an error, then print an error message as follows. For example, if the text the user enters is a name, the screenshot should be as follows (pay attention to the number of lines and so on):>> namename: command not found>>In the above 2.a and 2.b, after running the desired commands with the exec, it is requested that the outputs be read by the parent process from a file named file:Before running Exec in child process , create a file named file and redirect the stdoutu to that file. You are asked to do so as follows./*In CHILD PROCESS*/int new_out = open("file", O_WRONLY | O_CREAT | O_TRUNC, 0666);/*check for errors*/DUZELT AS /*dup()backup stdout holds a value stdoutu different from 1*/int saved_out = dup(1);/*check for errors*/close(1); /*file descriptor 1 empty*/dup2(new_out, 1); /*duplicate new_out to 1*//*check for errors*//*exec... *//*restoring stdoutu*/dup2(saved_out, 1); /*duplicate saved_out to 1*/close(saved_out);close(new_out);Open this file in parent process to read it and create a path name.After the command running with exec is terminated, the output is again redirected to a file as above and read from this file and stdouta is printed in parent process.System cals must be used for file read and write operations. So you can't use fopen etc. a share of preferred stock pays a dividend of $1.22 and has a discount rate of 16.2%. what is the price? . Write the enzymatic reaction of carbohydrates digestion by a-amylase. Starch+x-amylase glou cose + Maltose. Report your results: O Record the color changes of the 6 test tubes: tube: Dark blue tube: blue tube: light blue (4) tube: light blue tube: lighter 6 tube: it start from dark blue then going to lighter o What is the color of the stock solution tube after boiling for 20 minutes? lighter Experiment 2: Protein Digestion Write the enzymatic reaction of protein digestion by pepsin. Which test tube shows the optimum conditions required for the digestion of albumin and why? test tube 2 become it meaning all t human body condition including, 37C tempe the presence of acid, pepsin, albumin. protein al and the The gene for nose shape is found on the X chromosome. Round nose is dominant to pointed nose. Human individuals with XXY (an additional X chromosome) are male. Individuals with XO (only one X chromosome) are female. Individuals with XXX (three X chromosomes) are female. A man with a round nose and a woman with a pointed nose have a son with Klinefelter Syndrome (genotype XXY) with a pointed nose. Nondisjunction event (VERY RARE mistakes during meiosis) could happen in: Meiosis I of the father Meiosis II of the father Meiosis I of the mother Meiosis II of the mother More than one of these above At the end of the Calvin cycle, what molecule is being produced: Protein Glucose Fructose 1-phosphate CO2 Question 18 The various version of a given gene (e.g. eye color) are known as the ______of the eye color gene: Trait Allele Site Locust Locus 3. A traditional children's riddle concerns a farmer who is traveling with a sack of rye, a goose, and a mischievous dog. The farmer comes to a river that he must cross from east to west. A boat is av Let S be the spin operator of a spin 1 particle. (a) Show that [S, S3] = 0. What is the physical significance of this result? (b) Denote the simultaneous eigenstates of S^2 and S3 by 1 m). Write down the matrix representation of the operator S using the states |1 m) as the orthonormal basis. (c) Solve the eigenvalue problem S|x) = h|x), and express the states |x) in terms of the basis states [1 m). (Make sure that the states |x) are properly normalised). Write a short research paper on the development of Internet2 and how this deployment of this network will impact corporate WANs based on the Internet.Devise a strategy for connecting LANs for a single corporation with four geographically separate entities into a single corporate wide area network When the subject stood immediately after lying supine, their cardiovascular system responded in specific ways to adjust to the change in hydrostatic pressure and blood pressure. What changes occur in the heart itself? Explain the effect of nerves and hormones on the heart. [3 marks] Write a c# application that requests a mark from the user between 0-100. Create two parallel arrays, one being an array named marks[] that contains six ranges of low limits. The second array is named grades[] containing values between A-F. The application should allow us to search for a range match by determining the pair of limiting values between which a user's mark falls. Use the figure below as a guide as to what output should be seen.75-100, 70-74->B, 60-69->C, 50-59->D, 40-49.>E, 0-39->F W Our Company Grade FERNANDO MARTI (Student-section: 091) FISI3172-2021 2nd semester Messages Courses Help Logest Main Menu Contents Grades Syllabus Course Contents chaster14 Single Bi-Concave Lens Ortsvatata Feedback A single bi-concave lens (a lens with two concave surfaces) made of fused quartz (index of refraction n 1.46) has surfaces with radii of curvature r 21.0 cm and r2 = 21.0 cm. What is the focal length of the lens in air? Tries 0/12 If an object is placed at p= 10.0 cm from the lens, where is the image? (Use a positive sign for a real image or a minus sign for a virtual image.) Sant Tries 0/12 If the object has a height of h 1.30 cm, how large is the image? (Use a positive sign for an upright image or a minus sign for an inverted image.) Flowchart required for Rock, Paper, Scissors game.Rules of the Game:The objective of Rock, Paper, Scissors is to defeat your opponent by selecting a weapon that defeats their choice under the following rules:Rock smashes Scissors, so Rock winsScissors cut Paper, so Scissors winPaper covers Rock, so Paper winsIf players choose the same weapon, neither win and the game is played againProgram SpecificationsThis project requires you to use:input from the playerprint resultsat least one branching mechanism (if statement)at least one loop (while loop)Boolean logicYour program will allow a user to play Rock, Paper, Scissors with the computer. Each round of the game will have the following structure:The program will choose a weapon (Rock, Paper, Scissors), but its choice will not be displayed until later so the user doesnt see it.The program will announce the beginning of the round and ask the user for their choiceThe two weapons will be compared to determine the winner (or a tie) and the results will be displayed by the programThe next round will begin, and the game will continue until the user chooses to quitThe computer will keep score and print the score when the game endsThe computer should select the weapon most likely to beat the user, based on the users previous choice of weapons. For instance, if the user has selected Paper 3 times but Rock and Scissors only 1 time each, the computer should choose Scissors as the weapon most likely to beat Paper, which is the users most frequent choice so far. To accomplish this, your program must keep track of how often the user chooses each weapon. Note that you do not need to remember the order in which the weapons were used. Instead, you simply need to keep a count of how many times the user has selected each weapon (Rock, Paper or Scissors). Your program should then use this playing history (the count of how often each weapon has been selected by the user) to determine if the user currently has a preferred weapon; if so, the computer should select the weapon most likely to beat the users preferred weapon. During rounds when the user does not have a single preferred weapon, the computer may select any weapon. For instance, if the user has selected Rock and Paper 3 times each and Scissors only 1 time, or if the user has selected each of the weapons an equal number of times, then there is no single weapon that has been used most frequently by the user; in this case the computer may select any of the weapons.At the beginning of the game, the user should be prompted for input. The valid choices for input are:R or r (Rock)P or p (Paper)S or s (Scissors)Q or q (Quit)At the beginning of each round your program should ask the user for an input. If the user inputs something other than r, R, p, P, s, S, q or Q, the program should detect the invalid entry and ask the user to make another choice.Your program should remember the game history (whether the user wins, the computer wins, or the round is tied).At the end of the game (when the user chooses q or Q), your program should display the following:The number of rounds the computer has wonThe number of rounds the user has wonThe number of rounds that ended in a tieThe number of times the user selected each weapon (Rock, Paper, Scissors) most people in the underdeveloped countries of the world support themselves by:farmingmass productionfree enterprisecompetition C++. Can you compete the code* Lab to practice recursion using a particular linked list.#include #include using namespace std;/** Node Struct*/struct Node {Node(int data) : m_data(data), m_next(nullptr) {} // Overloaded constructorint m_data; // Data in nodeNode* m_next; // Pointer to next node};/** Name: InsertArray(int* arr, int size, Node* head)** Desc: This recursive function converts an array to a linked list** Preconditions: A valid array and its respective size* are passed to the function. A pointer to the head of* the linked list is also given.** Postcondition: All items from the passed array are* inserted in order into the linked list. The head of* the updated linked list is returned.** Hint: Be careful with the order of the recursive calls* and the inserts.** Hint 2: Plan your recursive case and base case before* coding.** Hint 3: The InsertArray function should insert nodes to* the front of the linked list and should start at the end of the array.*/// IMPLEMENT INSERTARRAY HERE - some hints are belowNode* InsertArray(int* arr, int size, Node* head) {// Recursive case (until no items remain, size != 0)// Create new node (with data from array) and insert node into list// Set m_next in node// Update head// Insert next item (recursively)// Base case (when size == 0)// Return the final head}/** main()* DO NOT EDIT*/int main() {const int ARR_SIZE = 6; // Size of the array being inserted into the linked listint arrToInsert[ARR_SIZE] = { 1, 2, 3, 4, 5, 6 }; // Array to populate linked listNode* head = nullptr; // Pointer to the first node in the linked list, head node// Print items in arraycout A cubical glass melting furnace has exterior dimensions of width W = 5 m on a side and is constructed from refractory brick of thickness L = 0.35 m and thermal conductivity k - 1.4 W/m K. The sides and top of the furnace are exposed to ambient air at 25 degree C. with free convection characterized by an average coefficient of h = 5 W/m2 K. The bottom of the furnace rests on a framed platform for which much of the surface is exposed to the ambient air. and a convection coefficient of h = 5 W/m2 K may be assumed as a first approximation. Under operating conditions for which combustion gases maintain the inner surfaces of the furnace at 1100 degree C. what is the heal loss from the furnace?