Question Completion with Options:
a. Translation of the entire L1 program into L0 code
b. Translation of the L0 program into L1 code
c. Creation of a language L3 that interprets L0 instructions
d. Interpretation of each L1 statement using L0 code as the L1 program is running.
Answer:
The important operations that must take place in this scenario are:
a. Translation of the entire L1 program into L0 code
d. Interpretation of each L1 statement using L0 code as the L1 program is running.
Explanation:
Translation enables decoding to take place. This means that the L1 program is decoded into a language that the L0 program can understand and execute. Without this translation, the higher level language of L1 will not be understood by the machine language of the L0 programs. Translation of a code creates a shared understanding, thereby easing program execution. Code translation is simultaneously accompanied by interpretation.
Filtering is a function of _____.
1. Import it into Eclipse. Open the file in Eclipse 2. Edit the file to add comments to identify the instance variables, constructors headings and method headings 3. Edit the file to build and add the UML in the Header comment of the code. You must do a very thorough job and be sure to pay attention to the details. 4. Save your Flower.java file. 5. Upload your updated Flower.java file here.package during_class_session;public class Flower{private String NameofFlower;private double PriceofFlower;public Flower() {this.setNameofFlower("No name yet");this.setPriceofFlower(0.0);}public Flower(String nameofFlower_initial, double priceofFlower_initial) {this.setNameofFlower(nameofFlower_initial);this.setPriceofFlower(priceofFlower_initial);}public String getNameofFlower() {return NameofFlower;}public void setNameofFlower(String nameofFlower) {NameofFlower = nameofFlower;}public double getPriceofFlower() {return PriceofFlower;}public void setPriceofFlower(double priceofFlower) {PriceofFlower = priceofFlower;}}
Answer:
/
Explanation:
List the four types of computer cases
Answer:
full-tower, mid-tower, mini-tower, and SFF(Small Factor Form).
I hope it helps.
Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that records the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20.
The program performs the following tasks:
Read the file name of the tsv file from the user.
Open the tsv file and read the student information.
Compute the average exam score of each student.
Assign a letter grade to each student based on the average exam score in the following scale:
A: 90 = < X o
B: 80 = < x < 90
C: 70 = < X < 80
D: 60 = < x < 70
E: X < 60
• Compute the average of each exam.
• Output the last names, first names, exam scores, and letter grades of the students into a text file named report.txt. Output one student per row and separate the values with a tab character.
• Output the average of each exam, with two digits after the decimal point, at the end of report.txt. Hint: Use the setprecision manipulator to format the output.
Ex: If the input of the program is:
StudentInfo.tsv
and the contents of StudentInfo.tsv are: 70 45 59
Barrett Edan 96 97 88
Bradshaw Reagan 73 94 80
Charlton Caius 88 61 36
Mayo Tyrese 90 86 45
the file report txt should contain
Barrett Edan 70 45 59 F
Baadha Boagan 9e 157 89 A
Charlton Caius 73 94 80 B
Mayo and Tyrese 58 61 36 D
Stern and Brenda 90 36 45 C
Average midterm 83.40, midterm2 76.60, final 61.60
In this exercise we have to use the knowledge of the JAVA language to write the code, so we have to:
The code is in the attached photo.
So to make it easier the code can be found at:
using namespace std;
// Class student required to store the data
class Student{
public:
string lname;
string fname;
int marks[3];
char grade;
// Function which generates the grade for student
void calculate_grade(){
double sum = 0;
for(int i=0;i<3;i++){
sum+= marks[i];
}
double average = sum/3;
if(average>=90 && average<100)
this->grade = 'A';
else if(average>=80)
this->grade = 'B';
else if(average>=70)
this->grade = 'C';
else if(average>=60)
this->grade= 'D';
else this->grade = 'F';
}
};
// This function reads the file , and creates a vector of Students data
vector read_file(string fileName){
// Opening the file
fstream fin;
fin.open(fileName);
// Temp variables
vector list;
vector row ;
string line, word, temp;
// Read the data into vector
while(getline(fin,line)){
row.clear();
stringstream s(line);
while(getline(s,word,'\t')){
row.push_back(word);
}
Student st;
st.fname = row[0];
st.lname = row[1];
st.marks[0] = stoi(row[2]);
st.marks[1] = stoi(row[3]);
st.marks[2] = stoi(row[4]);
st.calculate_grade();
list.push_back(st);
}
fin.close();
return list;
}
// This function takes filname to be output as input, and list of student
void writeFile(string filename, vector list){
// Opening the new file
ofstream fin(filename);
for(int i=0;i string line = list[i].fname+"\t"+list[i].lname+"\t"+to_string(list[i].marks[0])+"\t"
+to_string(list[i].marks[1])+"\t"+to_string(list[i].marks[2])+"\t"+list[i].grade+"\n";
fin<
}
// Find the stats required
double average1 =0,average2 =0 ,average3 = 0;
for(int i=0;i average1+=list[i].marks[0];
average2+=list[i].marks[1];
average3+=list[i].marks[2];
}
average1/=list.size();
average2/=list.size();
average3/=list.size();
// Writting the stats
fin<<"\n"<<"Average: "<<"mid_term1 "<
// Closing the file
fin.close();
}
int main(){
// Taking the input
cout<<"Enter the filename: ";
string filename;
cin>>filename;
vector list;
// Reading and Writting to the file
list = read_file(filename);
writeFile("report.txt",list);
}
See more about JAVA at brainly.com/question/2266606
check image dont answer if you dont know please
Answer:
Explanation:
1-2nd option
2-1st option
3-last option
hope this helps!! have a good rest of ur day!! <3
Responsible manner in video and audio conferencing
Answer:
1.Mute yourself when not speaking.
2.Be on time.
3.Ensure your technology works correctly.
4.Use technology to fully engage remote participants.
Explanation:
state the base of correct addition of 27 + 6 =34
Answer:
9
Explanation:
lets do calculations with ONLY the rightmost digits, ie., 7 + 6 = 4, so we're ignoring the carry.
Then, following must be true as well:
7+5 = 3
7+4 = 2
7+3 = 1
7+2 = 0 <= this reveals our base 9
7+1 = 8
7+0 = 7
list 3 things needed in order to complete mail merge process.
pls help me!
CAN SOMEONE PLEASE HELP ME WRITE AN INTRODUCTION ??? COMMENT FOR TOPIC
Answer:
Introductions
1.Attract the Reader's Attention. Begin your introduction with a "hook" that grabs your reader's attention and introduces the general topic. ...
2.State Your Focused Topic. After your “hook”, write a sentence or two about the specific focus of your paper. ...
3.State your Thesis. Finally, include your thesis statement.
what is office course
how to learn office course
Answer:
It includes Word, to create, polish, and share documents; Excel, to analyze and visualize data; PowerPoint, to create, collaborate, and effectively present ideas; OneNote, to organize ideas into a digital notebook; Outlook, to organize email, coordinate schedules, and stay up to date with contacts; Access, to create .Hope this helps you XD ✌️When using wildcards and the matching case option, which of the following would not be found by entering on in the Find dialog box?
1. den
2. down
3.Dayton
4. documentation
There are different types of Wildcard. The option that would not be found by entering on in the Find dialog box is called Dayton.
Wildcard is commonly known wild character or wildcard character. It is known as a symbol that is often used in place of or to stand for one or more characters.
Some wildcards are;
The asterisk (*)The question mark (?) Percent ( % )Wildcards are said to be universally used. Dayton cannot be found because it is not a wildcard but a name of a person.
Learn more about Wildcard from
https://brainly.com/question/7380462
write a short paragraph (three to four sentences) that explains how it works for computers and internet communications in relation to cybersecurity.
Answer:
Public and private keys form the basis for public key cryptography, also known as asymmetric cryptography. In public key cryptography, every public key corresponds to only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can decode it using their matching private key.
Explanation:
Change up the wording.
What was the main limitation of computer networking that the invention of the Robert website of the 1990s
Answer:
The TCP/IP protocol could only be used in universities, governments, and businesses. People around the world could not send data to one another.
how to set brainlyest
Write a program that simulates applying a "boost" to a spaceship in a spaceship race game.
A spaceship makes progress by getting a "boost" value between 0 and 10. The boost value
is determined from generating a random number between 0 and 10. Assuming the starting
distance of the spaceship is 0, the program will output the boost value and the total
distance travelled by the spaceship after applying the boost. (Note: Two newlines are output
after the final output of the program).
When a random seed value of 2 is used, the output of the program will look like:
Boost: 6
Distance travelled: 6
Programming languages can be used to simulate several scenarios; in this case, the "boost"
The simulating program in C++ where comments are used to explain each line is as follows:
#include<iostream>
#include<cstdlib>
#include<ctime>
using namespace std;
int main() {
// This sets the seed to time(0)
srand(time(0));
// This generates a random number between 0 and 10, to represent the boost
int boost = rand()%10;
// This prints the required outputs
cout << "Boost: " << boost;
cout << "\nDistance travelled: " << boost;
return 0;
}
Read more about similar programs at:
https://brainly.com/question/16240699
Add comma(s) where needed, if needed.
My birthday October 31 2005 is on Halloween.
My birthday October 31 2005 is on Halloween. (no change)
My birthday October 31, 2005, is on Halloween.
My birthday October 31, 2005 is on Halloween.
My birthday, October 31, 2005, is on Halloween.
Answer:
My birthday, October 31, 2005, is on Halloween.
Explanation:
The correct option with commas is "My birthday, October 31, 2005, is on Halloween."
Why is this correct?The revised sentence "My birthday, October 31, 2005, is on Halloween." correctly uses commas to separate the date from the year and to set off the date as an appositive.
This improves clarity and follows proper punctuation rules.
Hence,. The correct option with commas is "My birthday, October 31, 2005, is on Halloween."
Read more about commas here:
https://brainly.com/question/2142088
#SPJ2
Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found no flaws in it.). Now suppose that at the same time that Alice authenticates herself to Bob, Bob must authenticate himself to Alice. Give a scenario by which Trudy, pretending to be Alice, can now authenticate herself to Bob as Alice.
• R7.9 Write enhanced for loops for the following tasks.
a. Printing all elements of an array in a single row, separated by spaces.
b. Computing the maximum of all elements in an array.
2. Counting how many elements in an array are negative.
Answer:
a is the correct answer
Explanation:
correct me if I'm wrong hope it's help thanks
Yvonne is matting a series of photos as an anniversary gift for her parents. She hopes that they will cherish this gift for years to come but is concerned because she can’t afford the really nice mat board. What is Yvonne MOST LIKELY worried about?
A.
that the mat will turn black
B.
that the mat will take over the picture
C.
that the mat will disintegrate
D.
that the mat will discolor and deteriorate
Answer:
That the mat will discolor and deteriorate
Explanation:
D
Yvonne will most likely worry that the mat will discolor and deteriorate. The correct option is D.
What is matting in photos?Matting is a decorative border that surrounds the artwork. It is typically built of mat board, a type of board designed specifically for this purpose. After cutting the mat board to size, one or more holes (entries) are cut in the mat board to act as windows for displaying art.
Matting is the technique of separating an image's foreground and background components. Typically, the photos are of a frame or a video file. It adds a decorative edge to the print and a mechanism for hanging the photo.
Matting involves using a front or window mat to separate the image from the frame's glass and to give an extra border around the photo.
Therefore, the correct option is D. that the mat will discolor and deteriorate.
To learn more about matting in photos, refer to the link:
https://brainly.com/question/28279935
#SPJ2
What is property in educational technology
what is the relationship between interrupt and buffer
Answer:
Operating systems have some code called an 'interrupt handler', which prioritises the interrupts and saves them in a queue. Buffers are used in computers as a temporary memory area, and they are essential in modern computers because hardware devices operate at much slower speeds than the processor.
a
2 A car is fitted with the latest GPS navigation system. This device is controlled
by an embedded system in the form of a microcontroller.
Describe the inputs needed by the embedded system and describe which
outputs you would expect it to produce.
b Since updates to the GPS device are required every six months, explain how
the device is updated without the need to take the car to the garage every six
months.
Answer:
It probaly connected to the internet in some way to resieve updates
Hope This Helps!!!
A sample member of the list data is a1 = ['male', True] where the second item is True if the person is on the phone.
for item in data:
if item[0] == 'male':
males = males + 1
if item[___
]:
malesOnPhone = malesOnPhone + 1
Choices are 1, 2, 3. Answer is for if item[___]:
Three steps can be taken to construct a list of elements using a for loop: Make an empty list appear. Iterate through an iterable or set of elements. Add each component to the list's end.
What loop for sample member of the list data?An Array List can be looped through using an Iterator. If there are additional members in the Array List, the method hasNext() returns true; otherwise, it returns false. If there is no next element, the method next() raises the No Such Element Exception and returns the next element in the Array List.
FOR LOOPS and WHILE LOOPS are two popular types of loops. A For loop runs a variable number of times. LOOP TYPE — FOR LOOP When you know how many times you want to run an algorithm before stopping, you use for loops.
Therefore, Since indexation in lists begins at 0, we must compare item[0], which is “male,” with “male” in the if statement before iterating through males in the for loop.
Learn more about loop here:
https://brainly.com/question/14390367
#SPJ2
A user is following the instructions of a help desk technician and is attempting to launch System File Checker from the command-line interface. Each time the user types sfc /scannow and presses Enter, the utility fails to run, and an error appears stating the command must be run using an elevated command prompt.
state an application that would be better to write c++ than java and give a rationale for your answer
The collection of ____ bits make one nibble
Answer:
Hewo There!!
__________________
4
__________________
“It's really a wonder that I haven't dropped all my ideals, because they seem so absurd and impossible to carry out. Yet I keep them, because in spite of everything, I still believe that people are really good at heart.”
― Anne Frank, The Diary of a Young Girl
__________________
Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn
Provide your own examples of the following using Python lists. Create your own examples. Do not copy them from another source. Nested lists The “*” operator List slices The “+=” operator A list filter A list operation that is legal but does the "wrong" thing, not what the programmer expects Provide the Python code and output for your program and all your examples.
Lists are used in Python to hold multiple values in one variable
(a) Nested list
A nested list is simply a list of list; i.e. a list that contains another list.
It is also called a 2 dimensional list.
An example is:
nested_list = [[ 1, 2, 3, 4] , [ 5, 6, 7]]
(b) The “*” operator
The "*" operator is used to calculate the product of numerical values.
An example is:
num1 = num2 * num3
List slices
This is used to get some parts of a list; it is done using the ":" sign
Take for instance, you want to get the elements from the 3rd to the 5th index of a list
An example is:
firstList = [1, 2 ,3, 4, 5, 6, 7]
secondList = firstList[2:5]
The “+=” operator
This is used to add and assign values to variables
An example is:
num1 = 5
num2 = 3
num2 += num1
A list filter
This is used to return some elements of a list based on certain condition called filter.
An example that prints the even elements of a list is:
firstList = [1, 2 ,3, 4, 5, 6, 7]
print(list(filter(lambda x: x % 2 == 0, firstList)))
A valid but wrong list operation
The following operation is to return a single list, but instead it returns as many lists as possible
def oneList(x, myList=[]):
myList.append(x)
print(myList)
oneList(3)
oneList(4)
Read more about Python lists at:
https://brainly.com/question/16397886
Buddys machine shop has a kiosk computer located in the lobby for customers to use. The kiosk computer has recently been updated to Windows 10 from Windows 7 and is not part of a domain. The local computer policy created for Windows 7 has been applied to Windows 10. This policy severely restricts the use of the computer, so that customers can only use the web browser.
Occasionally, an administrator needs to sign in to the kiosk computer to perform maintenance and update software. However, this is awkward because the administrator needs to disable settings in local policy be performing any task. Then, when the tasks are complete, the administrator needs to re-enable the settings in the local policy. Explain how this system can be improved upon.
Game Changer Technologies has four software teams. Each of them is developing four different examples of its new game app. Which software development methodology is used by the Game Changer teams
The software development methodology used by the Game Changer teams is called; Prototyping
We are given that;
- Game changer technologies has four software teams
- Each of the teams develops 4 different examples of the new game app.
Now, since each of them is developing four four different examples of its new game app, the method being used is called prototyping. This is because prototyping is referred to as the early approximation of the final system of a product whereby such a product is built, tested and rebuilt if required until an acceptable prototype is achieved.
When the acceptable prototype is gotten, then it will be used to develop its final game app.
Read more about prototype at; https://brainly.com/question/25824140
Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of them are odd.
Answer:
import random
numbers = []
even = 0
odd = 0
for i in range(100):
numbers.append(random.randint(1, 200))
for i in range(100):
if numbers[i] % 2 == 0:
even += 1
else:
odd += 1
print("Even:", even)
print("Odd:", odd)
Explanation:
Gg ez.