In this exercise we have to use the knowledge of the JAVA language to write the code, so we have to:
The code is in the attached photo.
So to make it easier the code can be found at:
using namespace std;
// Class student required to store the data
class Student{
public:
string lname;
string fname;
int marks[3];
char grade;
// Function which generates the grade for student
void calculate_grade(){
double sum = 0;
for(int i=0;i<3;i++){
sum+= marks[i];
}
double average = sum/3;
if(average>=90 && average<100)
this->grade = 'A';
else if(average>=80)
this->grade = 'B';
else if(average>=70)
this->grade = 'C';
else if(average>=60)
this->grade= 'D';
else this->grade = 'F';
}
};
// This function reads the file , and creates a vector of Students data
vector read_file(string fileName){
// Opening the file
fstream fin;
fin.open(fileName);
// Temp variables
vector list;
vector row ;
string line, word, temp;
// Read the data into vector
while(getline(fin,line)){
row.clear();
stringstream s(line);
while(getline(s,word,'\t')){
row.push_back(word);
}
Student st;
st.fname = row[0];
st.lname = row[1];
st.marks[0] = stoi(row[2]);
st.marks[1] = stoi(row[3]);
st.marks[2] = stoi(row[4]);
st.calculate_grade();
list.push_back(st);
}
fin.close();
return list;
}
// This function takes filname to be output as input, and list of student
void writeFile(string filename, vector list){
// Opening the new file
ofstream fin(filename);
for(int i=0;i string line = list[i].fname+"\t"+list[i].lname+"\t"+to_string(list[i].marks[0])+"\t"
+to_string(list[i].marks[1])+"\t"+to_string(list[i].marks[2])+"\t"+list[i].grade+"\n";
fin<
}
// Find the stats required
double average1 =0,average2 =0 ,average3 = 0;
for(int i=0;i average1+=list[i].marks[0];
average2+=list[i].marks[1];
average3+=list[i].marks[2];
}
average1/=list.size();
average2/=list.size();
average3/=list.size();
// Writting the stats
fin<<"\n"<<"Average: "<<"mid_term1 "<
// Closing the file
fin.close();
}
int main(){
// Taking the input
cout<<"Enter the filename: ";
string filename;
cin>>filename;
vector list;
// Reading and Writting to the file
list = read_file(filename);
writeFile("report.txt",list);
}
See more about JAVA at brainly.com/question/2266606
Outlook 365 can be described as a personal information manager.
True or false
Answer:
True
Explanation:
The statement is True. The Microsoft Outlook 365 can be described as personal information manager.
What is Microsoft Outlook?Microsoft Outlook is the software system, that allows the users to manage various personal and official information and data altogether at one place.
The Microsoft Outlook is known as personal information manager because it allows the users to managing task, providing calendar services, helps in emailing. It also manages contact and keeps the record of journal logs and many more.
Therefore, the statement regarding outlook 365 is True.
Learn more about Microsoft Outlook, here:
https://brainly.com/question/17457799
#SPJ5
Develop a c program to display the following input output interphase enter a number 5
The table of 5 is
5*1=5
5*2=10
Answer:
int main()
{
int number;
printf("Enter a number: ");
scanf_s("%d", &number, sizeof(number));
for (int i = 1; i <= 2; i++) {
printf("%d*%d=%d\n", number, i, number * i);
}
}
Explanation:
I used the safe scanf_s() that takes a third parameter to indicate the size of the buffer. In this case it is the size of an integer.
1. Create a pseudocode program that asks students to enter a word. Call a function to compute the different ways in which the letters that make up the word can be arranged.
2. Convert the pseudocode in question one to JavaScript and test your program.
Answer:
1)Pseudocode:-
Prompt user to enter string
Pass it to combination function which can calculate the entire combination and can return it in an array
In combination method -
Check if the string is length 2 size ie of 0 or 1 length then return string itself
Else iterate through string user entered
Get the present character within the variable and check if the variable is already used then skip
Create a string from 0 to i the index + (concatenate) i+1 to length and recursive call combination function and pass this string and store end in subpermutation array
For each recursive call push character + sub permutation in total arrangement array.
2)Code -
function combinations(userStr) {
/* when string length is less than 2 then simply return string */
if (userStr.length < 2) return userStr;
/* this array will store number of arrangement that word can be stored */
var totalArrangements = [];
/* iterate through string user enter */
for (var i = 0; i < userStr.length; i++) {
/* get the current character */
var character = userStr[i];
/*check if character is already used than skip */
if (userStr.indexOf(character) != i)
continue;
/* create a string and concanete it form 0 to i index and i+1 to length of array */
var str = userStr.slice(0, i) + userStr.slice(i + 1, userStr.length);
/* push it to totalArrangments */
for (var subPermutation of combinations(str))
totalArrangements.push(character + subPermutation)
}
/* return the total arrangements */
return totalArrangements;
}
/* ask user to prompt string */
var userStr = prompt("Enter a string: ");
/* count to count the total number of combinations */
let count = 0;
/* call function the return tolal number of arrangement in array */
totalArrangements = combinations(userStr);
/* print the combination in console */
for (permutation of totalArrangements) {
console.log(permutation)
}
/* total combination will be totalArrangements.length */
count = totalArrangements.length;
/*print it to console */
console.log("Total combination " + count)
Output:-
Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of old files, then writes and saves the document. Describe how the OS interacts with the disk to allow the new file to be written.
Answer:
Explanation:
In a situation like this, the OS erases the files from its core, and saves the document in its files compartment
The hard drive on Frankie's computer is completely full. In this case, the OS deletes the files from its core and saves the document in its files' compartment because it has to produce and save a new document.
What is a document?Everybody has a distinctive signature, and signatures are crucial in proving that a person actually signed a document and accepted its terms.
An operating system (OS) is the program that controls all other application programs in a computer after being installed into the system first by a boot program.
Through a specified application program interface, the application programs seek services from the operating system (API)
Therefore, the OS will erase the file from the scratch and save it in a different folder.
To learn more about the document, refer to the below link:
https://brainly.com/question/14980495
#SPJ2
The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion
Answer:
B. data at rest, data in transit
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.
Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.
How does a computer work? Explain with an example.
Answer:
A computer system works by combining input, storage space, processing, and output. ... For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.
Part 1 - Write the ingredients list to a file (10 points) Modify the program you developed for Lab 5 to make it output the data in the same format to a text file cake_ingredients_list.txt Note: Writing to a file is easier to code, so let's do that first. Hints: After the file has been opened, call the .write() function to write one line at a time to the file, in almost the exact fashion as calling print
Answer:
Explanation:
I do not have access to the ingredients list so instead I created the list and added the ingredients needed to make a cake. Then I used a for loop to loop throught the ingredients in the list and the .write() method to write the data to a text file with the same name as in the question. The code was tested and the output to the file can be seen in the attached image below.
ingredients = ['sugar', 'butter', 'eggs', 'vanilla', 'flour', 'baking powder', 'milk']
file = open('cake_ingredients_list.txt', 'w')
for ingredient in ingredients:
file.write(ingredient + '\n')
What are some 5 constraints in using multimedia in teaching
Answer:
Explanation:
Technological resources, both hardware and software
Technological skills, for both the students and teacher
Time required to plan, design, develop, and evaluate multimedia activities
Production of multimedia is more expensive than others because it is made up of more than one medium.
Production of multimedia requires an electronic device, which may be relatively expensive.
Multimedia requires electricity to run, which adds to the cost of its use
There are constraints in using multimedia in teaching; The Technological resources, both hardware and software Also, Technological skills, for both the students and teacher
What is a characteristic of multimedia?
A Multimedia system has four characteristics and they are use to deliver the content as well as the functionality.
The Multimedia system should be be computer controlled. The interface is interactive for their presentation and lastly the information should be in digital.
There are constraints in using multimedia in teaching;
The Technological resources, both hardware and software
Also, Technological skills, for both the students and teacher
Since Time required to plan, design, develop, and evaluate multimedia activities
The Production of multimedia is more expensive than others because it is made up of more than one medium.
The Production of multimedia requires an electronic device, which may be relatively expensive.
The Multimedia requires electricity to run, which adds to the cost of its use.
Learn more about multimedia here;
https://brainly.com/question/9774236
#SPJ2
Binary search is a very fast searching algorithm, however it requires a set of numbers to be sorted.
a. True
b. False
Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using
Answer:
I'll let you make an educated guess off of this info! You always retain info better making an inference on a subject that you are having trouble with!
Explanation:
There are four types of wireless networks -- wireless local area networks, wireless metropolitan area networks, wireless personal area networks and wireless wide area networks -- each with its own function.
wireless local area networkA wireless local area network (WLAN) is a wireless distribution method for two or more devices. WLANs use high-frequency radio waves and often include an access point to the Internet. A WLAN allows users to move around the coverage area, often a home or small office, while maintaining a network connection.
wireless metropolitan area networkA metropolitan area network (MAN) is a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings. A MAN is larger than a local area network (LAN) but smaller than a wide area network (WAN).
wireless personal area networkA PAN provides data transmission among devices such as computers, smartphones, tablets and personal digital assistants. PANs can be used for communication among the personal devices themselves, or for connecting to a higher level network and the Internet where one master device takes up the role as gateway.
wireless wide area networkWireless wide area network (WWAN), is a form of wireless network. ... WWAN connectivity allows a user with a laptop and a WWAN card to surf the web, check email, or connect to a virtual private network (VPN) from anywhere within the regional boundaries of cellular service.
I hope this helped!!
shania
The network type Genevieve uses is a wireless local area network.
What is a wireless local area network?
A wireless local area network (WLAN) exists as a wireless distribution procedure for two or more devices. WLANs utilize high-frequency radio waves and often contain an access issue to the Internet. A WLAN permits users to move around the coverage area, often a house or small office, while preserving a network connection.
Therefore, the correct answer is option (a) LAN.
Complete questions:
Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using
(a) LAN
(b) MAN
(c) PAN
(d) WAN
To learn more about wireless local area networks refer to:
https://brainly.com/question/8985345
#SPJ2
Which devices are considered to be central venous access devices (CVADs)? (Select all that apply.) Group of answer choices Heparin locks Peripherally inserted central catheters (PICC lines) Implanted subcutaneous ports Saline locks
Answer:
The answer is
Peripherally inserted central catheters (PICC lines)
Implanted subcutaneous ports
Explanation:
Central venous access devices are devices which are normally put in the body with the sole aim of aiding the transport of substances into the bloodstream of an individual . Such substance may include drugs, hormones etc.
Examples of such devices include Peripherally inserted central catheters (PICC lines) and Implanted subcutaneous ports
Write a pseudocode method swap(aList, i, j) that interchanges the items currently in positions i and j of a list. Define the method in terms of the operations of the ADT list, so that it is independent of any particular implementation of the list. Assume that the list, in fact, has items at positions i and j. What impact does this assumption have on your solution
Answer:
Explanation:
The following pseudocode for this method using operations of the ADT list would be the following
swap(aList, indexI, indexJ) {
initialize temp_variable = Retrieve(indexI, aList)
Insert(Retrieve(indexJ, aList), indexI, aList)
Insert(Retrieve(indexI, aList), temp_variable, aList)
}
This code basically saves the aList index of i , into a temporary Variable. Then it sets the aList index of i to the value of the element in index of j. Then it does the same for the index of j with the tem_variable. If we assume that the indexes of i and j exist, then it can crash our entire program if those indexes are missing from the list when we try to access them.
What is hacking? Why is hacking a concern for law enforcement?
Answer:
hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.
Consider a DataFrame named df with columns named P2010, P2011, P2012, P2013, 2014 and P2015 containing float values. We want to use the apply method to get a new DataFrame named result_df with a new column AVG. The AVG column should average the float values across P2010 to P2015. The apply method should also remove the 6 original columns (P2010 to P2015). For that, what should be the value of x and y in the given code?
Answer:
x = 1
y = 1
Explanation:
The apply method has the axis argument which enables it to use the applied function either across the rows or columns, by passing the value 1 to the axis argument, the mean of at each index is calculated, (across the column) such that the length of the AVG column is equal to the lengtb of the original dataframe.
The drop method is used in pandas to remove row or column entry from a dataframe. To remove columns from a data table, the value 1 is passed to the axis argument of the drop method. Hence, passing 1 to the axis argument removes all 6 columns leaving only the AVG column in result_df.
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the following types of malware is MOST likely installed on the compromised host?
A. Keylogger
В. Spyware
C. Trojan
D. Backdoor
E. Rootkit
Answer:
C. Trojan
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
e) Point out the errors( if any) and correct them:-
class simple
{
inta,b,c;
double sumNumber
{
int d = a + b + c;
double e = d/5.6;
return e;
}
void show Number()
{
a = 10, b = 20, c=5;
System.out.println(d);
double f = sumNumber(a,b,c);
System.out.print(e);
}
}
Explanation:
double e-d/5.6;is wrong it should return to c
How to prepare and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50
Answer:
Create boxes with the following content
Initialize sum to 0, product to 1 and number to 1Check if number is a prime. If yes, update sum += number and product *= numberIncrease number by 1If number is <= 50, go back to "check" block.The check block has a diamond shape.
At the "yes" branch of the check block, you can create separate blocks for updating the sum and the product.
Connect the blocks using arrows.
Indicate the start and the end of the flow using the appropriate symbols.
The block to check if a number is a prime you could further decompose into the steps needed to do such a check.
A security analyst recommends implementing SSL for an existing web service. A technician installs the SSL certificate and successfully tests the connection on the server. Soon after, the help desk begins receiving calls from users who are unable to log in. After further investigation, it becomes clear that no users have successfully connected to the web server since the certificate installation. Which of the following is MOST likely the issue?
A. DA Incorrect firewall rules are blocking HTTPS traffic.
B. Users are still accessing the IP address and not the HTTPS address.
C. DC Workstations need an updated trusted sites list.
D Users are not using tokens to log on.
cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]
Answer:
please translate
Thank you✌️
explain how data structures and algorithms are useful to the use of computer in data management
Answer:
programmers who are competent in data structures and algorithms can easily perform the tasks related to data processing ,automated reasoning ,or calculations . data structure and algorithms is significant for developers as it shows their problems solving abilities amongst the prospective employers .
2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the
difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400
Some example leap years are 1600, 1712 and 2016.
Write a program that takes in a year and determines whether that year is a leap year.
Ex If the input is
1712
the output is
1712 13 leap year.
Ex If the nouts
1913
the outoutis
1913 not leap year.
Written is Coral Language
Answer:
integer userInput
userInput = Get next input
if userInput % 400 == 0
Put userInput to output
Put " is a leap year" to output
else
if userInput % 4 == 0
Put userInput to output
Put " is a leap year" to output
else
Put userInput to output
Put " is not a leap year" to output
Explanation:
I don't know what is so special about Coral but here we go. I couldn't find and IDE that supported Coral so I just used their Coral simulator on their website. The first if statement on line 5 determines if the number is divisible by 400. If so, the leap year is on a century year e.g 1900 1800. If not, the else statement will be executed and the second if statement will execute. If the number is divisible by 4, it is a leap year. If not, the else statement gets executed in which case the number was not a century leap year or a leap year. After that the program terminates.
Hope this helped :) If it didn't let me know and I do my best to find out what went wrong.
Have a good day :)
Which term refers to the use of expressions to check consistency in relation to other fields in the same record?
O data validation
O record validation
O input mask
O validation text
The term validation text refers to the use of expressions to check consistency in relation to other fields in the same record.
What is the use of validation text?The term Validation text is known to be one that helps a user to be able to have a message that can help them to be able to input data that is said to be not valid.
Conclusively, Validations rules is known to aid one in that one can check data for accuracy and consistency in terms of data entry.
Learn more about Validation text from
https://brainly.com/question/12069810
#SPJ2
How do l write a program which countdown from 10 to 3
Answer:
use loop
for(int i =10;i>2; i--)
{
System.out.println(i+"\n")
}
What is system software?
No Spam
Answer quickly
[tex]\large{\underline{\underline{\pmb{\tt{Answer:}}}}}[/tex]
System software controls a computer's internal functioning, chiefly through an operating system, and also controls such peripherals as monitors, printers, and storage devices.Answer:
[tex]\large\mathsf{\red{\underline{\underline{\pmb{System~ Software}}}}}[/tex]
[tex]\textsf{It is a set of programs}[/tex] [tex]\textsf{that control and manage the }[/tex] [tex]\textsf{operations of computer hardware.}[/tex] [tex]\textsf{It also helps application programs}[/tex][tex]\textsf{to execute correctly.}[/tex] [tex]\textsf{System Software are designed to}[/tex] [tex]\textsf{control the operation and extend}[/tex][tex]\textsf{the processing functionalities of}[/tex][tex]\textsf{ a computer system.}[/tex]Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
Answer:
gzvzvzvzbxbxbxb
Explanation:
hshzhszgxgxggdxgvdvsvzvzv
The analog computer deals directly with
continuously variable aspects of physical phenomena such as a electrical, mechanical etc.
The analog computer deals directly with measured values of continuous physical magnitude.
What is an Analog computer?An analog computer may be defined as a type of computer that is significantly used to process analog data. These computers store data as a continuum of physical quantities and perform calculations using measurements.
It is completely different from digital computers, which use symbolic numbers to represent results. are great for situations that require data to be measured directly without conversion to numbers or codes. Analog computers, although readily available and used in scientific and industrial applications such as control systems and aircraft, have largely been superseded by digital computers due to the many complications involved.
Therefore, the analog computer deals directly with measured values of continuous physical magnitude.
To learn more about Analog computers, refer to the link:
https://brainly.com/question/18943642
#SPJ2
Your question seems incomplete. The most probable complete question is as follows:
The analog computer deals directly with:
number or codes.measured values of continuous physical magnitude.signals in the form of 0 or 1.signals in discrete values from 0 to 9what is IBM 1401 used for? Write your opinion.
Explanation:
The 1401 was a “stored program computer,” allowing programmers to write (and share) applications loaded into the machine from punched cards or magnetic tape, all without the need to physically reconfigure the machine for each task.
What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sensitive information is stored in one secure place, or a distributed model, where information is spread around in many different places?
please help!....................
Answer:
Based on what the graph does on the number line, I would say 1100110
Every time the graph spikes up, that is a one, otherwise it is a zero.
Explanation:
Which of the following are examples of third party software that banks use? (Select all that apply.)
A -compliance reporting
B -unencrypted Microsoft Suite
C -accounting software
D -customer relationship management
Answer:
c , it is a correct answer for the question