Re-do Problem 1, but now implement the following method:
i must use this code :-
public static BagInterface intersection (BagInterface bagA, BagInterface bagB)
and here how my java program must work
This method must return a new bag which is the intersection of the two bags: bagA and bagB. An element appears in the intersection of two bags the minimum of the number of times it appears in either. For example, {1,1,2} ∩{1,1,2,2,3}= {1,1,2}. Do not forget to state the big O of your method implementation.
useing netbeans java
In: Computer Science
C++ Programming Chapter 7 Assignment:
Assignment #4 – Student Ranking :
In this assignment you are going to write a program that ask user number of students in a class and their names. Number of students are limited to 100 maximum. Then, it will ask for 3 test scores of each student. The program will calculate the average of test scores for each student and display with their names. Then, it will sort the averages in descending order and display the sorted list with students’ names and ranking.
Follow the Steps Below
In: Computer Science
Please Correct this Code. DO NOT, I repeat DO NOT edit the struct definitions and createNode Function because our prof said we shouldn't touch that part at all (I also staled that in the code). You can edit the others as far as it works. The task is to reverse 10 numbers in linked list using recursion. The 10 numbers should be inputted by the user. Please add comments to the edited code.
#include <stdio.h>
#include <stdlib.h>
//TASK: Reverse 10 numbers of linked list using recursion.
//Struct Definitions (DO NOT EDIT THIS PART)
typedef struct node { // (DO NOT EDIT THIS PART)
void* dataPtr; //(DO NOT EDIT THIS PART)
struct node* link; //(DO NOT EDIT THIS PART)
} NODE; // (DO NOT EDIT THIS PART)
//create NODE (DO NOT EDIT THIS PART)
NODE* createNode(void* itemPtr) { //(DO NOT EDIT THIS PART)
NODE* nodePtr; //(DO NOT EDIT THIS PART)
nodePtr = (NODE*) malloc (sizeof (NODE)); //(DO NOT EDIT THIS
PART)
nodePtr->dataPtr = itemPtr; //(DO NOT EDIT THIS PART)
nodePtr->link = NULL; //(DO NOT EDIT THIS PART)
return nodePtr; //(DO NOT EDIT THIS PART)
}
struct node* head;
void reverse(NODE* prev, NODE* curr) {
if (!curr){
return;
}
if (!curr->link) {
head=curr;
curr->link=prev;
return;
}
reverse(curr, curr->link);
curr->link=prev;
}
void display() {
struct node* value;
value = head;
while(value!=NULL) {
printf("%d ",value->dataPtr);
value=value->link;
}
printf("\n");
}
int main()
{
NODE* head=NULL;
int x;
printf("Enter 10 numbers to reverse ");
for(int i=0; i<9; i++) {
scanf(" %d ",&x);
}
head=createNode(x);
reverse(NULL, head); //reverse list recursively
printf("Reverse Linked List is ");
display();
return 0;
}
In: Computer Science
Re-do Problem 2, but now implement the following method: public static void deleteEvenNumbers() This method must delete all even numbers in the chain pointed to by aList, while preserving the original of the remaining numbers. For example, if aList is this list: 3, 9, 2, 10, 5, 6; the list becomes after calling the method as follows: 3, 9, 5.
useing netbeans
In: Computer Science
We want to make Error detection method, the even parity method. the input is 3bit binary, output is 1 bit of even parity bit.
if the 3 bit is 111 or 000 it is disable, other else are enable. we have to add this in even parity method.
if it is enable, the output 1 bit of even parity method will show.
if it is disable the output will be 0
(the gate must be maximum 4 bit input, and the number of gates must be at least)
draw the circuits
In: Computer Science
Pitch Deck
Overview
You have been hired to create a website. In this assignment, you will begin to gather the necessary information to complete the work and present your ideas to your client.
Instructions
You will need to answer the following questions:
In: Computer Science
Write a program to receive a string from the user and compares the first and second half of the word and prints “First and Second Half Same” or “First and Second Half Different”. If the length of the word is odd, ignore the middle letter.
For example:
Run 1:
Enter a word: abcdabc
First and Second Half Same
Run 2:
Enter a word: abcde
First and Second Half Different
Hint: use the Math.floor() and length() to get the halves of the string and use the equals() to perform the similarity check inside if-else statement.
**********************************************************************************
Write a program that reads three different integers from the users and prints “all the same” if they are all equal, “all different”, if three numbers are different and “neither” for all other cases.
For example:
Enter first number: 3
Enter first number: 2
Enter first number: 6
All Different.
**********************************************************************************
Write a program that reads three different floating point numbers from the users and prints the largest of those three:
For example:
First number: 2.36
Second number: 2.99
Third number: 2.78
Largest: 2.99
In: Computer Science
Jiang, F., Jiang, Y., Zhi, H., Dong, Y., Li, H., Ma, S., ... & Wang, Y. (2017). Artificial intelligence in healthcare: past, present and future. Stroke and vascular neurology, 2(4), 230-243.
In: Computer Science
THIS IS A C++ QUESTION(SOME OTHER ASSIGNMENTS ARE DISPLAYED TO GIVE BACKGROUND INFO ON THIS QUESTION, ONLY THIS QUESTION SHOULD BE SOLVED):
Focus
Update
Problem:
Building on previous assignments, we will be reading a file of commands to create Nobles and Warriors, and sending them off to battle.
Previous Assignments(As Background info):
1) We will model a game of medieval times. Our world is filled with warriors. Naturally what warriors like to do is fight. To the death. So we happily let them.
Each warrior starts out with a name and a certain amount of strength. Each time he fights, he loses some strength. (He gets to keep his name.) If his opponent is stronger than he is, then he loses all of his strength, in which case he is dead, or at the very least pretty useless as a fighter. Otherwise he loses as much strength as his opponent had. Of course, if he and his opponent had the same strength then they are both losers.
Even losers are allowed to pick a fight. It doesn't require having any strength in order to do battle with someone else. Not that you stand much of a chance of winning anything, but perhaps it's worth getting beaten (again) just to have those 15 seconds of fame.
Your program will read in a file of commands. There are three types of commands:
2)
We will expand our Warrior a little. Each Warrior will have a weapon. He is "born" with it, i.e. the weapon is created together with the warrior. It can only be accessed by him. It provides him with his strength. In battle, weapons lose their edge and weaken. When a Warrior's weapon loses all of its strength, the Warrior himself dies.
Implementation
3)
We will [continue to] model a game of medieval times. Our world is filled with not only warriors but also nobles. Nobles don't have much to do except do battle with each other. (We'll leave the feasting and other entertainments for add-ons.) Warriors don't have much to do except hire out to a noble and fight in his behalf. Of course the nobles are pretty wimpy themselves and will lose if they don't have warriors to defend them. How does all this work?
Hiring and Firing
Death
It's a sad topic, but one we do have to address.
A test program and output are attached. Note that the output shown is what you are expected to generate. Pardon us, we don't like limiting your creativity, but having your output consistent with ours makes the first step of grading a bit easier. And also helps you to be more confident that your code works.
Key differences:
Commands
Our application is going to rely on each Noble having a unique name and each Warrior having a unique name. Otherwise, how would we be sure who we were hiring (or firing). Note that this is not a requirement of the Noble and Warrior classes themselves, just of this particular use of them, i.e. our application.
Whenever you are displaying a Noble or a Warrior, you will use the output operator for the class.
Handle errors!
Previously we promised that all of the commands we gave you the input would be valid. Now we would like you to take some responsibility for checking the input. First, we still guarantee that the format of the file will be correct. That means that the Warrior command will always have a name and a strength. The Battle command will always have two names. The Status command will not have any other information on it than just the word Status.
However, you will need to detect and report any issues indicating inconsistencies, such as:
We have not specified the format of these error messages, so we'll leave that up to you. (You get to be creative!)
Input:
"Noble King_Arthur
Noble Lancelot_du_Lac
Noble Jim
Noble Linus_Torvalds
Noble Bill_Gates
Warrior Tarzan 10
Warrior Merlin 15
Warrior Conan 12
Warrior Spock 15
Warrior Xena 20
Warrior Hulk 8
Warrior Hercules 3
Hire Jim Spock
Hire Lancelot_du_Lac Conan
Hire King_Arthur Merlin
Hire Lancelot_du_Lac Hercules
Hire Linus_Torvalds Xena
Hire Bill_Gates Hulk
Hire King_Arthur Tarzan
Status
Fire King_Arthur Tarzan
Status
Battle King_Arthur Lancelot_du_Lac
Battle Jim Lancelot_du_Lac
Battle Linus_Torvalds Bill_Gates
Battle Bill_Gates Lancelot_du_Lac
Status
Clear
Status"
Output:
"Status
======
Nobles:
King_Arthur has an army of 2
Merlin: 15
Tarzan: 10
Lancelot_du_Lac has an army of 2
Conan: 12
Hercules: 3
Jim has an army of 1
Spock: 15
Linus_Torvalds has an army of 1
Xena: 20
Bill_Gates has an army of 1
Hulk: 8
Unemployed Warriors:
NONE
You don't work for me anymore Tarzan! -- King_Arthur.
Status
======
Nobles:
King_Arthur has an army of 1
Merlin: 15
Lancelot_du_Lac has an army of 2
Conan: 12
Hercules: 3
Jim has an army of 1
Spock: 15
Linus_Torvalds has an army of 1
Xena: 20
Bill_Gates has an army of 1
Hulk: 8
Unemployed Warriors:
Tarzan: 10
King_Arthur battles Lancelot_du_Lac
Mutual Annihalation: King_Arthur and Lancelot_du_Lac die at each other's hands
Jim battles Lancelot_du_Lac
He's dead, Jim
Linus_Torvalds battles Bill_Gates
Linus_Torvalds defeats Bill_Gates
Bill_Gates battles Lancelot_du_Lac
Oh, NO! They're both dead! Yuck!
Status
======
Nobles:
King_Arthur has an army of 1
Merlin: 0
Lancelot_du_Lac has an army of 2
Conan: 0
Hercules: 0
Jim has an army of 1
Spock: 15
Linus_Torvalds has an army of 1
Xena: 12
Bill_Gates has an army of 1
Hulk: 0
Unemployed Warriors:
Tarzan: 10
Status
======
Nobles:
NONE
Unemployed Warriors:
NONE"In: Computer Science
Question 2
employment_id, int; salary, float; marriage_status, bool.
In: Computer Science
Classes and Objects are the central of Object Oriented Programming (O.O.P.) This is a style of programming that focuses on using objects to design and build many great applications.
Do the following:
In: Computer Science
c++:
Exercise 1:
Study the tutorial from Unit 6 on Sorting Arrays and Vectors.
Write a program that generates a sequence of 20 random values between 0 and 99 in an array, prints the sequence, sorts it, and prints the sorted sequence. Use the sort method from the C++ standard library. Do not add duplicate values to your array.
Hint:
#include <algorithm> #include "math.h"
using namespace std;
const int SIZE = 100;
while (numAdded < 100) {
val = floor(rand() % 100); // Will generate values between 0 and 99 // if unique add to array otherwise skip }
// Your unsorted array will look something like this. Use a loop, not a declaration to // add your values
{13, 7, 6, 45, 21, 9, 87, 99,...};
sort(arr);
// Sorted will be:
{0,1,2,3,....,99}
Exercise 2:
Write a program that stores a list of countries: "Egypt", "Switzerland", "Argentina", "Spain", "Portugal", "Luxemburg", etc.
Initialize your array with a single statement. Then print out the array.
Use the sort function as before to sort the countries in alphabetical order.
Reprint your array.
Exercise 3:
Study the tutorial about vectors, if you haven't already. Implement exercises 1
and 2 using vectors. Then append an additional element to each list, print your
new lists and print and resort again.
In: Computer Science
This is a discussion question for a Networking Essentials Class.
What was the most important aspect of the Internet gaining wide acceptance in the United States?
Why?
In your answer consider networking, as well as identify hardware, software, network protocols, and legislation that have helped networking permeate into all layers of human life.
In: Computer Science
you will be implementing two functions for the LinkedList class. The function that you are implementing is called reverse and isPalindrome. The isPalindrome function should determine if the linked list is a palindrome or not and the reverse function should reverse the linked list.
When you are finished with the implementation, try to use valgrind to see if there are any other errors or memory leaks to deal with. valgrind ./lab7 or make val
This is an example of what the output should look like. Note that the program must compile without any warnings or memory leaks.
==2353315== Memcheck, a memory error detector
==2353315== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==2353315== Using Valgrind-3.16.0 and LibVEX; rerun with -h for copyright info
==2353315== Command: ./lab7
==2353315==
The word: tenet is a palindrome.
The word: LOLO is not a palindrome.
The word: Zendaya is not a palindrome.
The word: kayak is a palindrome.
The word: step on no pets is a palindrome.
The word: I did did I is a palindrome.
The word: CMSC 202 is not a palindrome.
The word: wasitacatisaw is a palindrome.
==2353315==
==2353315== HEAP SUMMARY:
==2353315== in use at exit: 0 bytes in 0 blocks
==2353315== total heap usage: 158 allocs, 158 frees, 76,512 bytes allocated
==2353315==
==2353315== All heap blocks were freed -- no leaks are possible
==2353315==
==2353315== For lists of detected and suppressed errors, rerun with: -s
==2353315== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
In: Computer Science
F = (AB' +A'B)(C+ D') Implement F with AND-OR gates (denoted as F1)
Implement F with multi-level NAND gate circuit (denoted as F2)
Implement F with multi-level NOR gate circuit (denoted as F3)
Verify F1 = F2 = F3 (using Verilog Structural level modeling)
In: Computer Science