Answer:
The best networking project for a final year are Security issues with mobile IP.IP based patients monitoring systems.Which of the following is an example of power redundancy?
UPS
Backup server
RAID
Fault tolerance
Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that records the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20.
The program performs the following tasks:
Read the file name of the tsv file from the user.
Open the tsv file and read the student information.
Compute the average exam score of each student.
Assign a letter grade to each student based on the average exam score in the following scale:
A: 90 = < X o
B: 80 = < x < 90
C: 70 = < X < 80
D: 60 = < x < 70
E: X < 60
• Compute the average of each exam.
• Output the last names, first names, exam scores, and letter grades of the students into a text file named report.txt. Output one student per row and separate the values with a tab character.
• Output the average of each exam, with two digits after the decimal point, at the end of report.txt. Hint: Use the setprecision manipulator to format the output.
Ex: If the input of the program is:
StudentInfo.tsv
and the contents of StudentInfo.tsv are: 70 45 59
Barrett Edan 96 97 88
Bradshaw Reagan 73 94 80
Charlton Caius 88 61 36
Mayo Tyrese 90 86 45
the file report txt should contain
Barrett Edan 70 45 59 F
Baadha Boagan 9e 157 89 A
Charlton Caius 73 94 80 B
Mayo and Tyrese 58 61 36 D
Stern and Brenda 90 36 45 C
Average midterm 83.40, midterm2 76.60, final 61.60
In this exercise we have to use the knowledge of the JAVA language to write the code, so we have to:
The code is in the attached photo.
So to make it easier the code can be found at:
using namespace std;
// Class student required to store the data
class Student{
public:
string lname;
string fname;
int marks[3];
char grade;
// Function which generates the grade for student
void calculate_grade(){
double sum = 0;
for(int i=0;i<3;i++){
sum+= marks[i];
}
double average = sum/3;
if(average>=90 && average<100)
this->grade = 'A';
else if(average>=80)
this->grade = 'B';
else if(average>=70)
this->grade = 'C';
else if(average>=60)
this->grade= 'D';
else this->grade = 'F';
}
};
// This function reads the file , and creates a vector of Students data
vector read_file(string fileName){
// Opening the file
fstream fin;
fin.open(fileName);
// Temp variables
vector list;
vector row ;
string line, word, temp;
// Read the data into vector
while(getline(fin,line)){
row.clear();
stringstream s(line);
while(getline(s,word,'\t')){
row.push_back(word);
}
Student st;
st.fname = row[0];
st.lname = row[1];
st.marks[0] = stoi(row[2]);
st.marks[1] = stoi(row[3]);
st.marks[2] = stoi(row[4]);
st.calculate_grade();
list.push_back(st);
}
fin.close();
return list;
}
// This function takes filname to be output as input, and list of student
void writeFile(string filename, vector list){
// Opening the new file
ofstream fin(filename);
for(int i=0;i string line = list[i].fname+"\t"+list[i].lname+"\t"+to_string(list[i].marks[0])+"\t"
+to_string(list[i].marks[1])+"\t"+to_string(list[i].marks[2])+"\t"+list[i].grade+"\n";
fin<
}
// Find the stats required
double average1 =0,average2 =0 ,average3 = 0;
for(int i=0;i average1+=list[i].marks[0];
average2+=list[i].marks[1];
average3+=list[i].marks[2];
}
average1/=list.size();
average2/=list.size();
average3/=list.size();
// Writting the stats
fin<<"\n"<<"Average: "<<"mid_term1 "<
// Closing the file
fin.close();
}
int main(){
// Taking the input
cout<<"Enter the filename: ";
string filename;
cin>>filename;
vector list;
// Reading and Writting to the file
list = read_file(filename);
writeFile("report.txt",list);
}
See more about JAVA at brainly.com/question/2266606
Responsible manner in video and audio conferencing
Answer:
1.Mute yourself when not speaking.
2.Be on time.
3.Ensure your technology works correctly.
4.Use technology to fully engage remote participants.
Explanation:
Diane, a developer, needs to program a logic component that will allow the user to enter a series of values
Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of them are odd.
Answer:
import random
numbers = []
even = 0
odd = 0
for i in range(100):
numbers.append(random.randint(1, 200))
for i in range(100):
if numbers[i] % 2 == 0:
even += 1
else:
odd += 1
print("Even:", even)
print("Odd:", odd)
Explanation:
Gg ez.
what is office course
how to learn office course
Answer:
It includes Word, to create, polish, and share documents; Excel, to analyze and visualize data; PowerPoint, to create, collaborate, and effectively present ideas; OneNote, to organize ideas into a digital notebook; Outlook, to organize email, coordinate schedules, and stay up to date with contacts; Access, to create .Hope this helps you XD ✌️A sample member of the list data is a1 = ['male', True] where the second item is True if the person is on the phone.
for item in data:
if item[0] == 'male':
males = males + 1
if item[___
]:
malesOnPhone = malesOnPhone + 1
Choices are 1, 2, 3. Answer is for if item[___]:
Three steps can be taken to construct a list of elements using a for loop: Make an empty list appear. Iterate through an iterable or set of elements. Add each component to the list's end.
What loop for sample member of the list data?An Array List can be looped through using an Iterator. If there are additional members in the Array List, the method hasNext() returns true; otherwise, it returns false. If there is no next element, the method next() raises the No Such Element Exception and returns the next element in the Array List.
FOR LOOPS and WHILE LOOPS are two popular types of loops. A For loop runs a variable number of times. LOOP TYPE — FOR LOOP When you know how many times you want to run an algorithm before stopping, you use for loops.
Therefore, Since indexation in lists begins at 0, we must compare item[0], which is “male,” with “male” in the if statement before iterating through males in the for loop.
Learn more about loop here:
https://brainly.com/question/14390367
#SPJ2
When using wildcards and the matching case option, which of the following would not be found by entering on in the Find dialog box?
1. den
2. down
3.Dayton
4. documentation
There are different types of Wildcard. The option that would not be found by entering on in the Find dialog box is called Dayton.
Wildcard is commonly known wild character or wildcard character. It is known as a symbol that is often used in place of or to stand for one or more characters.
Some wildcards are;
The asterisk (*)The question mark (?) Percent ( % )Wildcards are said to be universally used. Dayton cannot be found because it is not a wildcard but a name of a person.
Learn more about Wildcard from
https://brainly.com/question/7380462
Add comma(s) where needed, if needed.
My birthday October 31 2005 is on Halloween.
My birthday October 31 2005 is on Halloween. (no change)
My birthday October 31, 2005, is on Halloween.
My birthday October 31, 2005 is on Halloween.
My birthday, October 31, 2005, is on Halloween.
Answer:
My birthday, October 31, 2005, is on Halloween.
Explanation:
The correct option with commas is "My birthday, October 31, 2005, is on Halloween."
Why is this correct?The revised sentence "My birthday, October 31, 2005, is on Halloween." correctly uses commas to separate the date from the year and to set off the date as an appositive.
This improves clarity and follows proper punctuation rules.
Hence,. The correct option with commas is "My birthday, October 31, 2005, is on Halloween."
Read more about commas here:
https://brainly.com/question/2142088
#SPJ2
CAN SOMEONE PLEASE HELP ME WRITE AN INTRODUCTION ??? COMMENT FOR TOPIC
Answer:
Introductions
1.Attract the Reader's Attention. Begin your introduction with a "hook" that grabs your reader's attention and introduces the general topic. ...
2.State Your Focused Topic. After your “hook”, write a sentence or two about the specific focus of your paper. ...
3.State your Thesis. Finally, include your thesis statement.
List the four types of computer cases
Answer:
full-tower, mid-tower, mini-tower, and SFF(Small Factor Form).
I hope it helps.
Buddys machine shop has a kiosk computer located in the lobby for customers to use. The kiosk computer has recently been updated to Windows 10 from Windows 7 and is not part of a domain. The local computer policy created for Windows 7 has been applied to Windows 10. This policy severely restricts the use of the computer, so that customers can only use the web browser.
Occasionally, an administrator needs to sign in to the kiosk computer to perform maintenance and update software. However, this is awkward because the administrator needs to disable settings in local policy be performing any task. Then, when the tasks are complete, the administrator needs to re-enable the settings in the local policy. Explain how this system can be improved upon.
A user is following the instructions of a help desk technician and is attempting to launch System File Checker from the command-line interface. Each time the user types sfc /scannow and presses Enter, the utility fails to run, and an error appears stating the command must be run using an elevated command prompt.
a
2 A car is fitted with the latest GPS navigation system. This device is controlled
by an embedded system in the form of a microcontroller.
Describe the inputs needed by the embedded system and describe which
outputs you would expect it to produce.
b Since updates to the GPS device are required every six months, explain how
the device is updated without the need to take the car to the garage every six
months.
Answer:
It probaly connected to the internet in some way to resieve updates
Hope This Helps!!!
list 3 things needed in order to complete mail merge process.
pls help me!
state the base of correct addition of 27 + 6 =34
Answer:
9
Explanation:
lets do calculations with ONLY the rightmost digits, ie., 7 + 6 = 4, so we're ignoring the carry.
Then, following must be true as well:
7+5 = 3
7+4 = 2
7+3 = 1
7+2 = 0 <= this reveals our base 9
7+1 = 8
7+0 = 7
Provide your own examples of the following using Python lists. Create your own examples. Do not copy them from another source. Nested lists The “*” operator List slices The “+=” operator A list filter A list operation that is legal but does the "wrong" thing, not what the programmer expects Provide the Python code and output for your program and all your examples.
Lists are used in Python to hold multiple values in one variable
(a) Nested list
A nested list is simply a list of list; i.e. a list that contains another list.
It is also called a 2 dimensional list.
An example is:
nested_list = [[ 1, 2, 3, 4] , [ 5, 6, 7]]
(b) The “*” operator
The "*" operator is used to calculate the product of numerical values.
An example is:
num1 = num2 * num3
List slices
This is used to get some parts of a list; it is done using the ":" sign
Take for instance, you want to get the elements from the 3rd to the 5th index of a list
An example is:
firstList = [1, 2 ,3, 4, 5, 6, 7]
secondList = firstList[2:5]
The “+=” operator
This is used to add and assign values to variables
An example is:
num1 = 5
num2 = 3
num2 += num1
A list filter
This is used to return some elements of a list based on certain condition called filter.
An example that prints the even elements of a list is:
firstList = [1, 2 ,3, 4, 5, 6, 7]
print(list(filter(lambda x: x % 2 == 0, firstList)))
A valid but wrong list operation
The following operation is to return a single list, but instead it returns as many lists as possible
def oneList(x, myList=[]):
myList.append(x)
print(myList)
oneList(3)
oneList(4)
Read more about Python lists at:
https://brainly.com/question/16397886
Write a program that simulates applying a "boost" to a spaceship in a spaceship race game.
A spaceship makes progress by getting a "boost" value between 0 and 10. The boost value
is determined from generating a random number between 0 and 10. Assuming the starting
distance of the spaceship is 0, the program will output the boost value and the total
distance travelled by the spaceship after applying the boost. (Note: Two newlines are output
after the final output of the program).
When a random seed value of 2 is used, the output of the program will look like:
Boost: 6
Distance travelled: 6
Programming languages can be used to simulate several scenarios; in this case, the "boost"
The simulating program in C++ where comments are used to explain each line is as follows:
#include<iostream>
#include<cstdlib>
#include<ctime>
using namespace std;
int main() {
// This sets the seed to time(0)
srand(time(0));
// This generates a random number between 0 and 10, to represent the boost
int boost = rand()%10;
// This prints the required outputs
cout << "Boost: " << boost;
cout << "\nDistance travelled: " << boost;
return 0;
}
Read more about similar programs at:
https://brainly.com/question/16240699
1. Import it into Eclipse. Open the file in Eclipse 2. Edit the file to add comments to identify the instance variables, constructors headings and method headings 3. Edit the file to build and add the UML in the Header comment of the code. You must do a very thorough job and be sure to pay attention to the details. 4. Save your Flower.java file. 5. Upload your updated Flower.java file here.package during_class_session;public class Flower{private String NameofFlower;private double PriceofFlower;public Flower() {this.setNameofFlower("No name yet");this.setPriceofFlower(0.0);}public Flower(String nameofFlower_initial, double priceofFlower_initial) {this.setNameofFlower(nameofFlower_initial);this.setPriceofFlower(priceofFlower_initial);}public String getNameofFlower() {return NameofFlower;}public void setNameofFlower(String nameofFlower) {NameofFlower = nameofFlower;}public double getPriceofFlower() {return PriceofFlower;}public void setPriceofFlower(double priceofFlower) {PriceofFlower = priceofFlower;}}
Answer:
/
Explanation:
how to set brainlyest
What is property in educational technology
When do you think is the right time to use Styles,
Answer:
1. Democratic Management Style
2. Coaching Management Style
3. Affiliative Management Style
4. Pacesetting Management Style
5. Authoritative Management Style
6. Coercive Management Style
7. Laissez-Faire Management Style
8. Persuasive Management Style
what is the relationship between interrupt and buffer
Answer:
Operating systems have some code called an 'interrupt handler', which prioritises the interrupts and saves them in a queue. Buffers are used in computers as a temporary memory area, and they are essential in modern computers because hardware devices operate at much slower speeds than the processor.
• R7.9 Write enhanced for loops for the following tasks.
a. Printing all elements of an array in a single row, separated by spaces.
b. Computing the maximum of all elements in an array.
2. Counting how many elements in an array are negative.
Answer:
a is the correct answer
Explanation:
correct me if I'm wrong hope it's help thanks
state an application that would be better to write c++ than java and give a rationale for your answer
The collection of ____ bits make one nibble
Answer:
Hewo There!!
__________________
4
__________________
“It's really a wonder that I haven't dropped all my ideals, because they seem so absurd and impossible to carry out. Yet I keep them, because in spite of everything, I still believe that people are really good at heart.”
― Anne Frank, The Diary of a Young Girl
__________________
Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn
When defining a system
landscape, the following are all
necessary to operate the ERP
system,
except
Select one:
O a. Techincal expertise.
O b. Computer hardware.
O c. Networking hardware.
O d. None of the above.
O e. All of the above.
All of the given answer options are necessary to operate the enterprise resource planning (ERP) system when defining a system landscape.
Enterprise resource planning (ERP) can be defined as a business strategy process through which business firms manage and integrate the main parts of their day-to-day business activities by using software applications.
The main objective and purpose of an enterprise resource planning (ERP) system is to significantly reduce costs by integrating all the operations of a business firm.
In Computer science, when defining a system landscape, all of the following are necessary to operate the enterprise resource planning (ERP) system:
Technical expertiseComputer hardwareNetworking hardwareRead more on ERP system here: https://brainly.com/question/25752641
check image dont answer if you dont know please
Answer:
Explanation:
1-2nd option
2-1st option
3-last option
hope this helps!! have a good rest of ur day!! <3
Game Changer Technologies has four software teams. Each of them is developing four different examples of its new game app. Which software development methodology is used by the Game Changer teams
The software development methodology used by the Game Changer teams is called; Prototyping
We are given that;
- Game changer technologies has four software teams
- Each of the teams develops 4 different examples of the new game app.
Now, since each of them is developing four four different examples of its new game app, the method being used is called prototyping. This is because prototyping is referred to as the early approximation of the final system of a product whereby such a product is built, tested and rebuilt if required until an acceptable prototype is achieved.
When the acceptable prototype is gotten, then it will be used to develop its final game app.
Read more about prototype at; https://brainly.com/question/25824140
You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected
Considering the situation described here, the thing to do to ensure that the host OS is protected is to install a virtual machine.
What is a virtual machine?Virtual Machine is the virtualization of a computer system. The purpose of a Virtual Machine is to deliver the functionality of a physical computer containing the execution of hardware and software.
How Virtual Machine is used to ensure that the host OS is protectedVirtual Machine is used to host the virtual environment and subsequently run the operating system within the virtual machine.
This process allows the sandbox to be isolated from the physical hardware while accessing the installed operating system.
Hence, in this case, it is concluded that the correct answer is to install a virtual machine.
Learn more about Virtual Machine here: https://brainly.com/question/24865302