Questions
Debug the code in the starter file so it functions as intended and does not cause...

Debug the code in the starter file so it functions as intended and does not cause any errors. This program is intended to take two integer inputs and determine whether the second is a multiple of the first or not. The number b is a multiple of the number a if b can be divided by a with no remainder. Remember though that no number can be divided by 0 - so no numbers should be considered a multiple of 0 for the purpose of this exercise.

/* Lesson 5 Coding Activity Question 2 */

import java.util.Scanner;

public class U3_L5_Activity_Two{

public static void main(String[] args){

Scanner scan = new Scanner(System.in);

System.out.println("Enter two numbers");

int a = scan.nextInt();

int b = scan.nextInt();

if((b % a =! 0 | a == 0)

System.out.println(b + " is not a multiple of " + a);

else

System.out.println(b + " is a multiple of " + a);

}

}

In: Computer Science

`timescale 1 ns / 1 ns module cir(a, b, f); input a, b; output f; assignf=...

`timescale 1 ns / 1 ns
module cir(a, b, f); input a, b;
output f;
assignf= ~(a&b);
endmodule
(1). Write a general verilog testbench for the above circuit without using any task. You must include all four testing cases for a and b. module cir_tb;

In: Computer Science

C++ Please Fill in for the functions for the code below. The functions will implement an...

C++ Please

Fill in for the functions for the code below. The functions will implement an integer list using dynamic array ONLY (an array that can grow and shrink as needed, uses a pointer an size of array). Additional public helper functions or private members/functions can be used. The List class will be instantiated via a pointer and called similar to the code below:

class List {

public:

// Default Constructor

List() {// ... }

// Push integer n onto the end of the list

void push_back(int n) {// ... }

// Push integer n onto the beginning of the list

void push_front(int n) {// ... }

// Pop element at the end of list

int pop_back() {// ... }

// Pop element at the beginning of list

int pop_front() {// ... }

// Adds value at index pos. Indices start at 0

void emplace(int pos, int value) {// ... }

// Return whether the list is empty or not

bool empty() {// ... }

};

In: Computer Science

Roll dice java program The program simulates a dice roll by generating a random integer between...

Roll dice java program

The program simulates a dice roll by generating a random integer between 1 and 6

In: Computer Science

The goal of Requirements Engineering in the software development process is described below - •Determine exactly...

The goal of Requirements Engineering in the software development process is described below -

•Determine exactly what the client wants. This requires much interaction (interviews and questionnaires)

•What requirements are considered but not how to realize them

•Identify functional and non-functional requirements

•Extensive reviews to check that requirements satisfy client needs

From the Requirements Engineering phase, we obtain Requirements specification: the requirements will be precise (uniquely interpretable), complete (everything is specified) and consistent (no contradictions). It is the basis of contract between customer and developer.

Based on the above information, suppose you are working on building a new hypertext browsing system (web browser). Write the Requirements Specification for a hypertext browsing system (web browser).

Please help with this question and explain in your own words to avoid plagiarism. Thanks.

In: Computer Science

Translate the following C code into MIPS assembly code. Assume a in $s0, i in $s1,...

Translate the following C code into MIPS assembly code. Assume a in $s0, i in $s1, and base address of b[] in $s2, respectively. Note that the element’s data type in array b is integer (word). Please do not change the C code structure and please comment your MIPS code.

for (i = 100; i>a; i--) {         

b[i] = 16*i;

b[i+1] = 16*(i+1);

b[i+2] = 2*i + 16;

}

In: Computer Science

If the No of subnets is A (A=09), find the value of X in subnet mask...

If the No of subnets is A (A=09), find the value of X in subnet mask 255.255.X.0

please do step by step

In: Computer Science

in C programming language, write and test a function that writes and returns through an output...

in C programming language, write and test a function that writes and returns through an output parameter the longest common suffix of two words. (e.g. The longest common suffix of "destination" and "procrastination" is "stination", of "globally" and "internally" is "ally, and of "glove" and "dove" is the empty string)

In: Computer Science

Based on the business you proposed in deliverable 1, please submit A detailed ER diagram Definitions...

Based on the business you proposed in deliverable 1, please submit

  1. A detailed ER diagram
  2. Definitions of entities (include strong, weak, associative, supertype, subtype etc.) – minimum # of entities 4
  3. Definitions of relationships
  4. For each relationship, specify whether it is
    1. Required vs. optional
    2. Simple vs. composite
    3. Single-valued vs. multi-valued
    4. Also specify key identifier

Project Deliverable 2 (should have)

Attributes ◦ Customer ◦ Cust_ID: Customer ID; Key identifier; required; simple; single-valued ◦ Cust_Name: Customer name; Key identifier; required; simple; single-valued ◦ Address (street, city, zip, state): Customer address; required, composite; single-valued; state and city can be derived from zip ◦ Balance: Customer’s balance; optional; simple; single-valued ◦ For each entity, specify the attribute with ◦ Brief description (data definition) ◦ Classifications

IS 410 Project 1 Deliverable

Team Name: A-Team - Patricia Balram, David Seo, Dennis Kim, Ethan Lai

Responsibilities: No one is in charge of one specific task, we are all going to be working together collectively as a team for each part of the project.

Business Situation: The business problem we want to solve is finding the right staff for certain technology positions, when you go on a hiring website and look for people for a specific position you are loaded with resumes and people from different positional backgrounds, you don’t want to look through all of them. You want to be able to see people who have the most experience and what they are able to offer your company. People who will use it will be from Indeed.com, and other hiring websites.

Business Rules: Applicants will add their information such as years of work experience, certifications, gpa/where they graduated, etc onto hiring websites like Indeed.com. This information will then be stored into a database where it ranks the applicants in order from best to worst based on their attributes (example: a person with 10 years of work experience will be ranked higher than someone with 5). The employer will then use this information to schedule interviews with the top candidates instead of having to sort through every application one by one to find the right person.

Stored Data: Names, Work Experience, Qualifications/Certifications, Major from school along with GPA, Where they graduated from, and Level of Degree.

Assumptions: Only employers will be able to use this, people who are applying will not be able to use this feature

In: Computer Science

I need this written in C # ASAP Write a C# console program that continually asks...

I need this written in C # ASAP

Write a C# console program that continually asks the user "Do you want

to enter a name (Y/N)? ". Use a "while" loop to accomplish this. As long as the user enters

either an upper or lowercase 'Y', then prompt to the screen "Enter First and Last Name: " and

then get keyboard input of the name. After entering the name, display the name to the screen.

In: Computer Science

please write this in C # Create a Patient class which has private fields for patientid,...

please write this in C #

Create a Patient class which has private fields for patientid, lastname,

firstname, age, and email. Create public properties for each of these private fields with get and

set methods. The entire lastname must be stored in uppercase. Create a main class which

instantiates a patient object and sets values for each data item within the class. Display the

data in the object to the console window.

In: Computer Science

#include <stdio.h> int main() {      FILE *fp1;      char c;      fp1= fopen ("C:\\myfiles\\newfile.txt", "r");...

#include <stdio.h>

int main()

{

     FILE *fp1;

     char c;

     fp1= fopen ("C:\\myfiles\\newfile.txt", "r");

     while(1)

     {

        c = fgetc(fp1);

        if(c==EOF)

            break;

        else

            printf("%c", c);

     }

     fclose(fp1);

     return 0;

}

  1. In the program above which statement is functioning for opening a file
  2. Write the syntax for opening a file
  3. What mode that being used in the program. Give the example from the program
  4. Referring to the program above what has been stored in the pointer fp.
  5. Explain how to check whether the file has opened successfully?
  6. Write code that will check the file has opened successfully.
  7. Explain the function that can be used to read a file
  8. Explain how to write a file. Write C program to with the file.
  9. Explain the function used for closing a file.
  10. Write a program that contain open, read, write and close operation in C.
  11. How to read/write (i/o) strings in files?
  12. Write a program to read the strings from a file in C programming.

In: Computer Science

Application layer protocol: An application that uses peer-to-peer networks: A DNS server A URL: An Audio...

  1. Application layer protocol:
  2. An application that uses peer-to-peer networks:
  3. A DNS server
  4. A URL:
  5. An Audio compression technique
  6. An application for content distribution networks:
  7. An HTTP-based email client:
  8. A web development pprogramming language.
  9. An application that uses TCP transport protocol:
  10. An application that uses UDP transport protocol:

In: Computer Science

Give an example of possible information embedded in the header by the following layers: Application layer....

Give an example of possible information embedded in the header by the following layers:

  1. Application layer.
  2. Presentation layer
  3. Session layer
  4. Transport layer

In: Computer Science

in java please!!! suppose there is a text file named TextFile.txt with some data in the...

in java please!!!

suppose there is a text file named TextFile.txt with some data in the root directory (e.g. C:\ or \) of your computer. In JAVA, write code that (i) opens the file in read mode; (ii) displays the file content on the monitor screen/console; (iii) uses exception handling mechanism with try, catch, and finally blocks; and (iv) safely closes the file. Writing the main() method is optional.

In: Computer Science