Questions
Question 1: The following questions contains real numbers for COVID-19 daily report made on 2020-09-07 Use...

Question 1:

The following questions contains real numbers for COVID-19 daily report made on 2020-09-07

Use the CREATE TABLE command and Insert command to create the following table. For each field, pick the most appropriate data type for it.

Give the table name COVID_REPORT and make “Country_name” as Primary Key.

Question 1:

The following questions contains real numbers for COVID-19 daily report made on 2020-09-07

Use the CREATE TABLE command and Insert command to create the following table. For each field, pick the most appropriate data type for it.

Give the table name COVID_REPORT and make “Country_name” as Primary Key.

Country_name

Continent

new_cases

new_deaths

total_cases

total_deaths

Saudi Arabia

Asia

895

32

320827

4081

Bahrain

Asia

676

2

54771

198

United Kingdom

Europe

2988

2

347152

41551

France

Europe

7071

3

324777

30701

Lebanon

Asia

415

4

20426

191

Country_name

Continent

new_cases

new_deaths

total_cases

total_deaths

Saudi Arabia

Asia

895

32

320827

4081

Bahrain

Asia

676

2

54771

198

United Kingdom

Europe

2988

2

347152

41551

France

Europe

7071

3

324777

30701

Lebanon

Asia

415

4

20426

191

In: Computer Science

To be Completed in C# Write a program that creates an exception class called ManyCharactersException, designed...

To be Completed in C#

Write a program that creates an exception class called ManyCharactersException, designed to be thrown when a string is discovered that has too many characters in it. Consider a program that takes in the last names of users. The driver class of the program reads the names (strings) from the user until the user enters "DONE". If a name is entered that has more than 20 characters, throw the exception. Design the program such that it catches and handles the exception if it is thrown. Handle the exception by printing an appropriate message, and then continue processing more names by getting more inputs from the user. Note: Your program should exit only when the user enters "DONE".

SAMPLE OUTPUT:

Enter strings. When finished enter DONE

Short string

You entered: Short string

Medium size string

You entered: Medium size string

Really really long string, someone stop me!

You entered too many characters

DONE

You entered:

DONE

Good bye!

In: Computer Science

Whenever an exception arises, it terminates the program execution, which means it stops the execution of...

Whenever an exception arises, it terminates the program execution, which means it stops the execution of the current java program.
a) Identify and explain how the remedy for the exception is considered.
b) Implement the above-identified remedy in the java program to overcome the problem raised in the exceptional case when we try to open and close the files.

In: Computer Science

Create HiArrayPerson class to store objects of type class Person (in java ) and Give example

  1. Create HiArrayPerson class to store objects of type class Person (in java ) and Give example

In: Computer Science

DHCP Troubleshooting Review the following technical support email from a junior IT admin: Facilitation Dear IT...

DHCP Troubleshooting

Review the following technical support email from a junior IT admin:

Facilitation

Dear IT Admin:

I am working at a branch office and have been tasked with changing out the DHCP scope to match the overall corporate IP address scheme. The main office assigned me an IP address range of 192.168.0.200 through 192.168.0.225. I changed the scope on Friday afternoon and came in on Monday morning to discover that only some of the workstations had picked up new leases from the new DHCP scope. Any ideas as to what may be happening, what I might check or adjust?

Thank you, Junior Admin

-- Respond in detail with clarifying questions, suggested approaches and/or possible solutions

In: Computer Science

List two algorithms commonly used to identify a frame for replacement

List two algorithms commonly used to identify a frame for replacement

In: Computer Science

1a. Computers that predated the transistor (such as the ENIAC) used what technology to implement binary...

1a. Computers that predated the transistor (such as the ENIAC) used what technology to implement binary logic?

1b. How many electons does each of the following elements have?

silicon

boron

phosphorus


1c. A diode has how many terminals and how many junctions ?

A transistor has how many terminals and how many junctions?

In: Computer Science

What characteristics need to be exhibited by an organization to improve its software process?

What characteristics need to be exhibited by an organization to improve its software process?

In: Computer Science

In Software Engineer, What is forward engineering? Explain in detail.

In Software Engineer, What is forward engineering? Explain in detail.

In: Computer Science

in what ways does technology change society?how is tecnology affecting your life?

in what ways does technology change society?how is tecnology affecting your life?

In: Computer Science

Please write in C using linux or unix.please include pictures of the terminal output. Write a...

Please write in C using linux or unix.please include pictures of the terminal output.

Write a program that will simulate non - preemptive process scheduling algorithm:

First Come – First Serve

Your program should input the information necessary for the calculation of average turnaround time including:

  • Time required for a job execution;
  • Arrival time;

The output of the program should include: starting and terminating time for each job, turnaround time for each job, average turnaround time.

Step 1: generate the input data (totally 10 jobs) and save it in the array of structure composing the arrival time, service time, termination time, turnaround time. The service time follows the uniform distribution in the range of [5, 25], and the arrival time is generated by uniform distribution in the range of [0,10] accumulated based on the previous arrival time.

Step 2: program FCFS algorithm.

Note: be careful about the situation that one job is finished while the next job is not arrived yet, so you have the idle time between them.

Step 3: output

print out one line for each job with arrival time, start time, service, termination time, turnaround time, finally average turnaround time in the last line.

In: Computer Science

Python Create a program Given the temperature of 100=> Sc=> 1 rooms on the third flow,...

Python Create a program
Given the temperature of 100=> Sc=> 1 rooms on the third flow, you simply have to identify the hottest of tthem. If two rooms have the sane temperature , then you should choose the one that has the highest pisition in the entry specification( the last to enter) Simple, right?
The first line of the entry is S, the number of rooms for this problem. In each of the following S lines there is a real number T <= 1000.00, which represents the temperature of the S- th rooms
Constraints
T (Temperature) is a real number.

Output Format
It Should print the position of the warmest room.

sample output
5
5.26
10.59
8.4
9.2
10.58
Sample input
6
5.26
10.59
8.4
9.051
10.58
10.59
Sample output 1
6


In: Computer Science

Garden Lili inherited her grandfather’s land and wanted to start gardening. Lili’s garden size is X...

Garden

Lili inherited her grandfather’s land and wanted to start gardening. Lili’s garden size is X × Y with various types of plants marked with integer c.

Given a two-dimensional array that contains the type of plant in the garden. Lily wants to make T changes to the garden. For each change made, Lili will plant c in the a-th row of the b-th column of the array. The row and column starts from number 1.

Format Input:

The input consists of integers X and Y followed by an array of X × Y , then contains an integer T which is the number of changes made by Lili. The next T line contains three numbers a, b, c which contains the array location index you want to change to the integer c.

Format Output:

The output contains a two dimensional array in the form of a Lili garden plan after a change is made.

Constraints

• 1 ≤ a, b, c, X, Y ≤ 100

• 1 ≤ T ≤ 1000

Sample Input 1 (standard input):

3 3

1 1 1

1 1 1

1 1 1

3

1 1 3

2 2 3

3 3 3

Sample Output 1 (standard output):

3 1 1

1 3 1

1 1 3

Sample Input 2 (standard input):

5 3

1 2 3

4 5 6

7 8 9

10 11 12

13 14 15

3

1 1 16

1 2 17

1 3 18

Sample Output 2 (standard output):

16 17 18

4 5 6

7 8 9

10 11 12

13 14 15

note : USE C language, integer must be the same as the constraint, DONT USE VOID, RECURSIVE(RETURN FUNCTION), RESULT, code it under int main (must be blank){

In: Computer Science

In Windows system programming, many system resources are represented as kernel objects, each of which is...

In Windows system programming, many system resources are represented as kernel objects, each of which is represented as a handle. Discuss with 3 examples how the system programmer can manipulate these handle objects.

In: Computer Science

23. Consider a trigger which archives deleted rows from a table into a separate archive table....

23. Consider a trigger which archives deleted rows from a table into a separate archive table.

a. Is using a trigger to achieve this using needless computation power?

b. What is another way of implementing this feature without using triggers?

c. What are the arguments in favour of this solution?

d. What are the arguments against this solution?

23. Consider a trigger which archives deleted rows from a table into a separate archive table.

a. Is using a trigger to achieve this using needless computation power?

b. What is another way of implementing this feature without using triggers?

c. What are the arguments in favour of this solution?

d. What are the arguments against this solution?

In: Computer Science