Translate the following C code into MIPS assembly code. Assume a in $s0, i in $s1, and base address of b[] in $s2, respectively. Note that the element’s data type in array b is integer (word). Please do not change the C code structure and please comment your MIPS code.
for (i = 100; i>a; i--) {
b[i] = 16*i;
b[i+1] = 16*(i+1);
b[i+2] = 2*i + 16;
}
In: Computer Science
} 1. write a function that takes a string as parameter, return true if it’s a valid variable name, false otherwise. You can use keyword module’s iskeyword() to determine is a string is keyword.
import keyword
keyword.iskeyword(var) #returns true or false
}2. write a function that returns the length of a string (without using len() function)
}3. write a function that counts number of vowels in a string
}4. write a function that checks if a word is palindrome
PYTHON PROGRAMMING
In: Computer Science
course: Applications of mobile application development
Complete the tasks listed and submit in a word document with 3 pages length
In: Computer Science
This question has been answered before. I need a new, slightly modified code for the following:
A palindrome is a word that it reads the same left to right and right to left. For this programming assignment, you need to write a C++ program that does the following:
Please provide new code along with screenshot of output.
In: Computer Science
: After reading the assigned text, sit at the steps of your building/house for 20 minutes and observe what you see. Practice writing ethnographic field notes in your field notebook. What have you observed? Did you notice anything you have never noticed before? Response: Write a 250 - 400 word response in the discussion board. Summarize key points in the reading. Share your experiences of sitting on your steps.
In: Psychology
The accompanying table lists the numbers of words spoken in a day by each member of 56 different randomly selected couples. Complete parts (a) and (b) below.
Male Female
27,927 20,148
14,850 24,892
6,324 5,396
28,793 19,140
26,459 10,862
6,331 16,212
21,862 10,044
17,046 19,135
26,084 13,129
21,814 20,366
11,281 16,227
10,646 12,021
12,117 17,875
22,161 22,720
20,445 4,559
777 19,113
19,858 22,515
9,697 17,186
21,106 16,356
16,351 12,606
17,379 29,934
21,860 9,533
9,490 15,950
8,727 7,057
25,605 11,467
10,938 17,266
13,660 14,053
12,902 20,586
12,420 21,947
19,386 13,760
12,208 34,815
8,785 6,963
20,279 11,051
18,780 11,383
10,942 29,385
14,293 20,829
16,338 16,538
9,692 18,877
17,919 19,691
12,542 16,350
13,288 20,009
4,492 12,051
18,659 17,262
12,905 15,835
16,066 29,738
17,528 37,631
17,176 26,754
39,110 35,995
17,427 26,199
45,872 33,488
26,231 18,078
9,468 7,326
16,372 25,366
10,868 16,571
7,911 13,590
19,102 28,627
a. Use a
0.050.05
significance level to test the claim that among couples, males speak fewer words in a day than females.In this example,
mu Subscript dμd
is the mean value of the differences d for the population of all pairs of data, where each individual difference d is defined as the words spoken by the male minus words spoken by the female. What are the null and alternative hypotheses for the hypothesis test?
Upper H 0H0:
mu Subscript dμd
▼
less than<
greater than>
not equals≠
equals=
nothing word(s)
Upper H 1H1:
mu Subscript dμd
▼
less than<
equals=
not equals≠
greater than>
nothing word(s)
(Type integers or decimals. Do not round.)
Identify the test statistic.
tequals=nothing
(Round to two decimal places as needed.)
Identify the P-value.
P-valueequals=nothing
(Round to three decimal places as needed.)
What is the conclusion based on the hypothesis test?
Since the P-value is
▼
less than or equal to
greater than
the significance level,
▼
fail to reject
reject
the null hypothesis. There
▼
is not
is
sufficient evidence to support the claim that males speak fewer words in a day than females.
b. Construct the confidence interval that could be used for the hypothesis test described in part (a). What feature of the confidence interval leads to the same conclusion reached in part (a)?
The confidence interval is
nothing
word(s)less than<mu Subscript dμdless than<nothing
word(s).
(Round to one decimal place as needed.)
What feature of the confidence interval leads to the same conclusion reached in part (a)?
Since the confidence interval contains
▼
only negative numbers,
only positive numbers,
zero,
▼
fail to reject
reject
the null hypothesis.
Enter your answer in each of the answer boxes.
In: Statistics and Probability
PYTHON CODE
Step one: Copy and paste these lyrics into a multistring line
"Do you ever feel like a plastic bag
Drifting through the wind
Wanting to start again?
Do you ever feel, feel so paper-thin
Like a house of cards, one blow from caving in?
Do you ever feel already buried deep
Six feet under screams but no one seems to hear a thing
Do you know that there's still a chance for you
'Cause there's a spark in you?
You just gotta ignite the light and let it shine
Just own the night like the 4th of July
'Cause, baby, you're a firework
Come on, show 'em what you're worth
Make 'em go, "Ah, ah, ah"
As you shoot across the sky
Baby, you're a firework
Come on, let your colors burst
Make 'em go, "Ah, ah, ah"
You're gonna leave 'em all in awe, awe, awe
You don't have to feel like a wasted space
You're original, cannot be replaced
If you only knew what the future holds
After a hurricane comes a rainbow
Maybe a reason why all the doors are closed
So you could open one that leads you to the perfect road
Like a lightning bolt your heart will glow
And when it's time you'll know
You just gotta ignite the light and let it shine
Just own the night like the 4th of July
'Cause, baby, you're a firework
Come on, show 'em what you're worth
Make 'em go, "Ah, ah, ah"
As you shoot across the sky
Baby, you're a firework
Come on, let your colors burst
Make 'em go, "Ah, ah, ah"
You're gonna leave 'em all in awe, awe, awe
Boom, boom, boom
Even brighter than the moon, moon, moon
It's always been inside of you, you, you
And now it's time to let it through, -ough, -ough
'Cause, baby, you're a firework
Come on, show 'em what you're worth
Make 'em go, "Ah, ah, ah"
As you shoot across the sky
Baby, you're a firework
Come on, let your colors burst
Make 'em go, "Ah, ah, ah"
You're gonna leave 'em all in awe, awe, awe
Boom, boom, boom
Even brighter than the moon, moon, moon
Boom, boom, boom
Even brighter than the moon, moon, moon"
Step two: Then display and record the following statistics...
In: Computer Science
Item 1
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
A teacher is one who guides or leads. To guide does not necessarily mean to instruct directly. We often think of teaching as direct instruction (presenting information, asking questions, giving feedback, demonstrating some procedure, evaluating student progress, and so on). But a teacher can guide without instructing directly. A good example is the Montessori system of education. In a Montessori school, most of what a child learns is through interacting with a variety of curriculum materials in a particular context. A Montessori teacher does much less direct instruction than do teachers in traditional schools. References: |
Teachers should be guides or leaders. In the role of a guide, a teacher does less presenting of information, demonstrating and providing feedback. For example, in a Montessori school, most student learning occurs through interaction with a variety of class materials, rather than interaction with a teacher. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 2
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
To summarize, the elaboration model of instruction starts by presenting knowledge at a very general or simplified level in the form of a special kind of overview. Then it proceeds toadd detail or complexity in "layers" across the entire breadth of the content of the course (or curriculum), one layer at a time, until the desired level of detail or complexity is reached. References: |
They soon switched to a model based on the elaboration theory (Reigeluth, 1999). Using this approach, the game would begin with a level that offered the simplest version of the whole task (the epitome); subsequent levels would become increasingly more complex--an approach common to videogames--with opportunities for review and synthesis. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 3
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
In a complex task such as creating a website for learning, instructors may want to support the generation of multiple solutions in learners' peer feedback. Anonymity may create a social context where learners feel freer to express varied ideas, and make the task of giving feedback less inhibited. However, teachers need to know just how anonymity impacts the learning dynamic in order to make informed choices about when anonymous configurations are appropriate in peer feedback. References: |
Increased availability of technology in my classroom makes it easier for peer feedback activities to be conducted anonymously which "may create a social context where learners feel freer to express varied ideas, and make the task of giving feedback less inhibited" (Howard, Barrett, & Frick, 2010, p. 90). However, I worry that my students may be overly harsh if they don't have to stand by their comments. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 4
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
While solitary negative reactions or unjustified suggestions for change have the potential to dissipate discourse rather than build it, the pattern analysis shows that the anonymous condition seemed to provide a safe explorative space for learners to try out more reasons for their multiple solutions. Teachers will rarely give anonymous feedback, but the experience of giving anonymous feedback may open a social space where learners can try out the reasons for their suggestions. References: |
In their study of anonymity in an online peer feedback activity, the authors found that, under conditions of anonymity, learners seemed more inclined to provide reasons to back up their suggestions (Howard, Barrett, & Frick, 2010). Getting both suggestions and the reasons for the suggestions would be welcome in feedback I receive from peers or my instructors. Seeing the reasons would help me know that the suggestions have been thought through (even if I don't always agree with them). References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 5
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
The concept of systems is really quite simple. The basic idea is that a system has parts that fit together to make a whole; but where it gets complicated - and interesting - is how those parts are connected or related to each other. There are many kinds of systems: government systems, health systems, military systems, business systems, and educational systems, to name a few. References: |
Frick (1991) claims that systems, including both business systems, and educational systems, are actually very simple. The main idea is that systems "have parts that fit together to make a whole" (The nature of systems in education section, para. 1). What is further interesting to Frick is how those parts are connected together. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 6
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Instructional designers typically employ models
to guide their day-to-day work. Due to the increased practice of
the systematic design of instruction in a growing number of
settings, available models become more and more
proliferated, focusing on particular types and contexts of
learning, particular groups of learners or designers, or particular
instructional units (either whole curricula or individual
modules or lessons.) References: |
"The main goal of any instructional design process is to construct a learning environment in order to provide learners with the conditions that support desired learning processes" (van Merriënboer, 1997, p. 2). Process models proliferate because more and more designers generate models that focus on specific contexts, learners, or even units of instruction, according to van Merriënboer.
|
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 7
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Analysis of patterns in time (APT) is a method for gathering information about observable phenomena such that probabilities of temporal patterns of events can be estimated empirically. If appropriate sampling strategies are employed, temporal patterns can be predicted from APT results. Finally, APT is compared to the linear models approach and event history analysis. The major difference is that in APT there is no mathematical model assumed to characterize relations among variables. In APT the model is the temporal pattern being investigated. References: |
APT is an empirical approach to observing and coding phenomena by using mutually exclusive and exhaustive categories within multiple classifications (Frick, 1990). Once these data have been collected, researchers specify APT queries to calculate the probability of joint and/or sequential patterns of interest. In effect, researchers create measures of temporal patterns by counting the occurrences of these coded patterns. According to Frick, Analysis of Patterns in Time is different from the linear models approach of measuring variables separately and using statistics to analyze their relations. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 8
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Because computer systems exhibit performative intelligence, we can teach them to do tasks. It is this very capability that makes it possible to use computers as an interactive medium for instruction and learning. It is interaction which sets computers systems apart from other media such as books, television, and film. However, present-day computers literally do not understand the culturally bound meanings of the messages which they manipulate during these interactions because such computers lack qualitative intelligence. References: |
According to Frick (1997), computer systems demonstrate performative intelligence, when compared to other media such as books, television, and film. Computers can be programmed to do things. This feature of computer systems makes them an alternative medium for instruction and learning. However, he claims that computer systems lack the ability to understand the meaning of messages they send and receive during interaction with students and teachers. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 9
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Educational researchers, policymakers, and practitioners agree that educational research is often divorced from the problems and issues of everyday practice--a split that creates a need for new research approaches that speak directly to problems of practice (National Research Council [NRC], 2002) and that lead to the development of "usable knowledge" (Lagemann, 2002). Design-based research (Brown, 1992; Collins, 1992) is an emerging paradigm for the study of learning in context through the systematic design and study of instructional strategies and tools. We argue that design-based research can help create and extend knowledge about developing, enacting, and sustaining innovative learning environments. References: |
A decade later, researchers interested in studying learning in naturalistic settings (inspired by Brown's approach) began a concerted effort to define the standards and argue the legitimacy of this type of research through design. For example, the Design-Based Research Collective defined design-based research (DBR) as "an emerging paradigm for the study of learning in context, through the systematic design and study of instructional strategies and tools" (DBRC, 2003, p. 5). References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 10
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
First, the potential of digital games is discussed using the tutor/tool/tutee framework proposed by Taylor (1980). Second, the potential of digital games to enhance learning by connecting game worlds and real worlds is stated. Third, the possibility of digital games to facilitate collaborative problem-solving is addressed. Fourth, the capability of digital games to provide an affective environment for science learning is suggested. Last, the potential of using digital games to promote science learning for younger students is indicated. References: |
There are five advantages of using games in science learning stated in the literature. Games can be used as tools; make connections between virtual worlds and the real world; promote collaborative problem solving; provide affective and safe environments; and encourage younger students for science learning. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
In: Psychology
My question below
Write a complete program that performs encryption/decryption of a text file. Encryption means you need to scramble the words of a file to become secure. Decryption means you need to apply some rules to an encrypted file in order to find the original file with its original content. An example of encryption is to replace each letter in a file with its consecutive letter in the alphabet. Therefore, ‘a’ is replaced by ‘b’, ‘b’ is replaced by ‘c’ and so on and finally ‘z’ is replaced by ‘a’. Thus, if the file contains the following message:
I am a student at csusm
The encrypted message becomes:
J bn b tuvefou bu dtvtn
Then if you get this encrypted message and the key is 1, it means you need to shift the alphabets in the decrypted message by 1 to the left to get the original message back.
This method is called “rot1” indicating that every alphabet rotates by 1 during the encryption. Similarly, rot10 means every alphabet should be rotated by 10 during encryption.
Another method of encryption is to create cryptogram. A cryptogram is a message or word where each letter is replaced with another letter. For example, the string:
The birds name was squawk
might be scrambled to form
xms kbypo zhqs fho obrhfu
Note that space or any punctuation is not scrambled. In this particular case, ‘T’ was replaced with ’x’, each ‘a’ was replaced with ‘h’. etc. We assume there is no difference between lower case or uppercase. Therefore, you must turn all of the letters of a word into lower case before encrypt it. For example, if your work is “McMaster”, the function (word = “tolower(“McMaster”)) makes word to be equal to “mcmaster”.
Your job is to write a driver program(look at the program guide to see how to create a driver program)that performs different types of encryption or description. First, you need to ask the user to see if the user wants to do encryption or decryption. If the user wants to do encryption, you should find out if the user wants to use “rot” method or cryptogram method. If the user selects the “rot” method, you need to ask for the encryption key. For example, entering 15, means that the user wants to use “rot15” method to do encryption. If the user selects the cryptogram method, you should open the cryptogram text file called “CryptoKey” where the cryptogram string is stored. The cryptogram string should contain a string of 26 letters where the first letter corresponds to letter ‘a’, the second letter corresponds to letter ‘b’ and so on. For example, your cryptogram file may contain the following message.
uhtxvdepqlzfonkcrwyijsgabm
which means ‘u’ corresponds to ‘a’, ‘h’ corresponds to ‘b’ and … and finally ‘m’ corresponds to ‘z’.
The same procedure should be followed for decryption. You need to ask the user which method the user wants to use (rot or cryptogram) for encryption. Then write the routines that takes an encrypted file and does the decryption to get the original file back.
You are responsible to use string and vector class in this program. For encryption, you need to read the file to be encrypted into a vector of string and place the words (one word per element) into a vector. Then read the elements of your vector one by one and do the encryption and place the encrypted word into another vector. Finally write the content of encrypted vector to an output file.
For decryption, you need to do the same process which is read the file that contains the encrypted information and place the encrypted words one by one into a vector. Then create another vector so that as you decrypt the information you can place the decrypted words into another vector. Finally, the vector that contains the decrypted words (original message) should be written to an output file.
Here is a message you can do your test:
Psychology is the study of mindand behavior[1][2]. It is an academic disciplineand an applied sciencewhich seeks to understand individuals and groups by establishing general principles and researching specific cases [3][4]. In this field, a professional practitioneror researcher is called a psychologistand can be classified as a social, behavioral, or cognitive scientist. Psychologists attempt to understand the role of mental functionsin individual and social behavior, while also exploring the physiologicaland biologicalprocesses that underlie cognitive functions and behaviors. Psychologists explore concepts such as perception, cognition, attention, emotion, intelligence, phenomenology, motivation, brain functioning, personality, behavior, and interpersonal relationships, including psychological resilience, family resilience, and other areas. Psychologists of diverse orientations also consider the unconscious mind. [5]Psychologists employ empirical methodsto infer causaland correlationalrelationships between psychosocial variables. In addition, or in opposition, to employing empiricaland deductivemethods, some especially clinicaland counselingpsychologists at times rely upon symbolic interpretationand other inductivetechniques. Psychology has been described as a "hub science", [6]with psychological findings linking to research and perspectives from the social sciences, natural sciences, medicine, humanities, and philosophy
Place the above message in a text file called “Original.txt” and test your program based on the following:
Execute your program to run the driver routine. Then do the following:
Encrypt the original message using “rot21” (shifting every alphabet to the right 21) and call the file EncryptRot.txt
Encrypt the original message using the following cryptogram and call the file EncryptCrypto.txt
yihtqkcdplzuvwmxsgajbrfeon
Decrypt “EncryptRot.txt” file using “rot21” (shifting every alphabet to the left 21) places and call it “DecryptRot.txt”
Decrypt “EncryptCypto.txt” file using the above cryptogram and call it “DecryptCrypto.txt”
Your “DecryptRot.txt” and “DecryptCrypto.txt” should be similar (not exactly identical) to your “Original.txt” file you used for encryption. For example, in the decrypted files all words are in lower case but it is not necessarily the case in the “Original.txt” file.
Need help with finishing this code please:
string getOriginalFileName();
vector <string> PlaceOriginalIntoVector(const string&);
int DriverProgram();
vector <string> EncVectorUsingRot(const vector <string>&);
vector <string> DecVectorUsingRot(const vector <string>&);
vector <string> EncVectorUsingCrypto(const vector <string>&);
vector <string> DecVectorUsingCrypto(const vector <string>&);
string getOriginalFileName()
{
string fileName;
bool done = false;
while (!done)
{
cout << "What is the Name of the original File? ";
cin >> fileName;
ifstream fin;
fin.open(fileName.data());
if (!fin)
cout << "The file name does not exists. Try again: " << endl;
else
{
done = true;
}
}
return fileName;
}
vector <string> PlaceOriginalIntoVector(const string& OriginalFile)
{
vector <string> V;
ifstream fin;
fin.open(OriginalFile.data());
string word;
while (fin >> word)
V.push_back(word);
return V;
}
int DriverProgram()
{bool done = false;
int choice = 0;
while (!done)
{cout << << endl;
cout << "1: Encrypt using \"rot\" method" << endl;
cout << "2: Decrypt using \"rot\" method" << endl;
cout << "3: Encrypt using \"Cryptogram\" method" << endl;
cout << "4: Decrypt using \"Cryptogram\" method" << endl;
cout << "5: Decrypt using \"Cryptogram\" method" << endl;
cout << "Quit the program" << endl;
cout << "Enter your choice: ";
cin >> choice;
if (choice >= 1 && choice <= 5)
done = true;
else
cout << "Try a number between 1 and 5 as shown above" << endl;
}
return choice;
}
vector <string> EncVectorUsingRot(const vector <string>& OriginalVector)
{
cout << "EncVecUsingRot" << endl;
vector <string> V;
return V;
}
vector <string> DecVectorUsingRot(const vector <string>& EncVecRot)
{
cout << "I am in DecVecUsingRot routine " << endl;
vector <string> V;
return V;
}
vector <string> EncVectorUsingCrypto(const vector <string>& OriginalVector)
{
cout << "I am in EncVecUsingCrypto routine" << endl;
vector <string> V;
return V;
}
vector <string> DecVectorUsingCrypto(const vector <string>& EncVecCrypto)
{
cout << "I am in DecVecUsingCrypto routine" << endl;
vector <string> V;
return V;
}
int main()
{
string OriginalFile = getOriginalFileName();
cout << "The name of the file is: " << OriginalFile << endl;
vector <string> OriginalVector = PlaceOriginalIntoVector(OriginalFile);
int last = OriginalVector.size()-1;
cout << "First word in the file is: " << OriginalVector[0] << endl;
cout << "Last word in the file is: " << OriginalVector[last] << endl;
vector <string> EncVecRot, DecVecRot, EncVecCrypto, DecVecCrypto;
bool done = false;
while (!done)
{
int choice = DriverProgram();
if (choice == 1)
{
cout << "choice is 1: EncUsingRot" << endl;
EncVecRot = EncVectorUsingRot(OriginalVector);
}
else if (choice == 2)
{
cout << "choice is 2: DecUsingRot" << endl;
DecVecRot = DecVectorUsingRot(EncVecRot);
}
else if (choice == 3)
{
cout << "choice is 3: EncUsingCrypto" << endl;
EncVecCrypto = EncVectorUsingCrypto(OriginalVector);
}
else if (choice == 4)
{
cout << "choice is 4: DecUsingCrypto" << endl;
DecVecCrypto = DecVectorUsingRot(EncVecCrypto);
}
else if (choice == 5)
{
cout << "choice is 5: Quiting the program" << endl;
done = true;
}
}
system("pause");
return 0;
}
In: Computer Science
The purpose of this assignment is to review the current state of development for your state's health information exchange (HIE) and current participation rate.
Compare your state to three states with similar demographics. Write a 1,000-1,250 word summary related to the ability of your state's HIE to share data and improve the following:
**IMPORTANT** - Please have an original assignment not copied because I have to submit to a citing program. ***
Please cite
In: Nursing