Questions
Write a program in C to grade an n-question multiple-choice exam (for n between 5 and...

Write a program in C to grade an n-question multiple-choice exam (for n between 5 and 20) and provide feedback about the most frequently missed questions. Your program will use a function scan_exam_data to scan and store the exam data in an appropriate data structurer. Use file redirection to input data – do not use fopen() in your code. The first line of input contains the number of students. Second line is number of questions on the exam followed by a space and then an n-character string of the correct answers. Each of the lines that follow contain an integer student ID followed by a space and then the student answers.


Sample Input

3

5 dbbac

111 dabac

102 dcbdc

251 dbbac


Your program then uses a function analyze_data to calculate each student’s score as a percentage and the number of each missed questions in the exam. A function print_data will be called to produce an output, containing the answer key, each student’s ID, each student’s score as a percentage, and information about how many students missed each question.


Sample Output

Exam Report

Students 3

Question 1 2 3 4 5

Answer d b b a c

ID Score(%)

111 80

102 60

251 100

Question 1 2 3 4 5

Missed by 0 2 0 1 0


Error checking
You will have to perform some error checks while the program is being running. However, these error checks will not cause the program to terminate – except if you have a corrupted file. Your program should print error messages when appropriate. Here is a list that need to be checked: Illegal inputs like the number of questions must be between 5-20 and key answers must be lower-case letters.

In: Computer Science

Plan, Develop and Manage a Security Policy Background: Consider that the Commonwealth Government of Australia is...

Plan, Develop and Manage a Security Policy

Background:

Consider that the Commonwealth Government of Australia is planning to launch ‘My Health Record’ a secure online summary of an individual’s health information. The system is available to all Australians, My Health Record is an electronic summary of an individual’s key health information, drawn from their existing records and is designed to be integrated into existing local clinical systems.

The ‘My Health Record’ is driven by the need for the Health Industry to continue a process of reform to drive efficiencies into the health care system, improve the quality of patient care, whilst reducing several issues that were apparent from the lack of important information that is shared about patients e.g. reducing the rate of hospital admissions due to issues with prescribed medications. This reform is critical to address the escalating costs of healthcare that become unsustainable in the medium to long term.

Individuals will control what goes into their My Health Record, and who is allowed to access it. An individual’s My Health Record allows them and their doctors, hospitals and other healthcare providers to view and share the individual’s health information to provide the best possible care.

The 'My Health Record' is used by various staff such as System Administrator, Doctor, Nurse, Pathologist and Patient. In order to convey and demonstrate the rules and regulations to the users of this system, Commonwealth Government of Australia needs a security policy.

You are employed as the Security Advisor for the organisation. The task that is handed to you by the Chief Information Officer now is to create, develop and manage "System Access Security Policy" for atleast any 3 users of the system.

Plan a Security Policy

  • Identify and explain the role of planning for security policy.
  • Identify and discuss the best strategic planning for security policy.
  • Explain the resources planning required for security policy.
  • Anything else you think is reasonable to place into a Plan for Security Policy based on what you have learnt.

Develop a Security Policy

  • Define the intent and rationale of the policy.
  • Any definitions which are used through out the document.
  • Responsibilities of individuals i.e. those who enforce the guideline.
  • Scope of the policy i.e. who and what it effects.
  • Anything else you think is reasonable to place into a Develop for Security Policy based on what you have learnt.

Manage a Security Policy

  • Describe how to monitor policy.
  • Explain how to control policy.
  • Identify and explain the major outcome of policy.
  • Explain how do you update policy time to time.
  • Anything else you think is reasonable to place into a Manage for Security Policy based on what you have learnt.

Conclusion.

In: Computer Science

Language Assembly ( required) Write and test a function, drawshape. The function has 2 parameters, the...

Language Assembly ( required)

Write and test a function, drawshape. The function has 2 parameters, the shape's character and the length of the shape's longest line.

draw shape(1, x) looks displays

x

x

draw shape(2, y) displays

yy

y

yy

draw shape(3, z) displays

zzz

zz

z

zz

zzz

and so on.

In: Computer Science

Highway 65, Inc., is going to elect six board members next month. Betty Brown owns 16.8...

Highway 65, Inc., is going to elect six board members next month. Betty Brown owns 16.8 percent of the total shares outstanding. a. What percentage of stock is needed to have one of her friends elected under the cumulative voting rule? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.) b. What percentage of stock is needed to have one of her friends elected under the staggered cumulative voting rule under which shareholders vote on two board member(s) at a time? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.)

In: Finance

The market price of a stock is $21.98 and it is expected to pay a dividend...

The market price of a stock is $21.98 and it is expected to pay a dividend of $1.59 next year. The required rate of return is 11.86%. What is the expected growth rate of the dividend?

Answer format: Percentage Round to: 2 decimal places (Example: 9.24%, % sign required. Will accept decimal format rounded to 4 decimal places (ex: 0.0924))

In: Finance

Can I get some simple pseudocode (simple descriptions as exampled in top italicized line) added to...

Can I get some simple pseudocode (simple descriptions as exampled in top italicized line) added to this small section of Java code? Thumbs up always left for answers!

-------------------------------------------------------------------------------------------------------

// Check to see if two bags are equals.

   public boolean equals(LinkedBag<T> aBag) {
       boolean result = false; // result of comparison of bags

       if (this.numberOfEntries == aBag.numberOfEntries) {
           if (numberOfEntries == 0) {
               return true;
           }
           int i = 0, j = 0;
           Node scout = firstNode;
           Node retrieve = aBag.firstNode;
           while ((i < numberOfEntries) && (scout != null)) {
               while ((j < aBag.numberOfEntries) && (retrieve != null)) {
                   if (scout.data.equals(retrieve.data)) {
                       int freq1 = this.getFrequencyOf(scout.data);
                       int freq2 = this.getFrequencyOf(retrieve.data);
                       if (freq1 == freq2) {
                           result = true;
                       } else {
                           result = false;
                       }
                   } // end if
                   retrieve = retrieve.next;
                   j++;
               }
               scout = scout.next;
               i++;
           } // end while
       } else {
           result = false;
       }

       return result;
   } // end equals

//Duplicate all the items in a bag.

   public boolean duplicateAll() {
       boolean success = true;

       Node scout = firstNode;
       int i = 0;
       while (i < numberOfEntries) {
           Node temp = new Node(scout.data, firstNode);
           firstNode = temp;
           scout = scout.next;
           i++;
       }
       numberOfEntries *= 2;

       return success;
   } // end duplicateAll

// Remove all duplicate items from a bag

   public void removeDuplicates() {
       System.out.print("Initial > ");
       System.out.println(this.toString());
       LinkedBag<T> newBag = new LinkedBag<T>();

       if (numberOfEntries == 0) {
           return; // Do nothing
       }

// Create filler values to avoid null pointer
       for (int k = 0; k < numberOfEntries; k++) {

           newBag.add((T) "_");
       }

       Node scout = firstNode;
       Node replace = newBag.firstNode;

       int i = 0;
       while ((i < numberOfEntries) && (scout != null)) {
           int j = 0;
           while ((j < numberOfEntries) && (replace != null)) {
               if (newBag.contains(scout.data)) {
                   break;
               } else {
                   replace.data = scout.data;
                   replace = replace.next;
                   j++;
               }
           }
           if (scout != null) {
               scout = scout.next;
               i++;
           }

       }

// Remove filler values
       Node newScout = newBag.firstNode;
       while (newBag.contains((T) "_")) {
           newBag.remove((T) "_");
       }

       this.firstNode = newBag.firstNode;
       this.numberOfEntries = newBag.numberOfEntries;

       System.out.print("Final > ");
       System.out.println(toString());

       return;
   }
}

In: Computer Science

c++. please read this task carefully. First, try given examples of input to your code, if...

c++. please read this task carefully.

First, try given examples of input to your code, if it works, then send it here.

Create structure Applicants with following fields:

struct applicants{

int id;

string name;

string surname;

int subject1,subject2,subject3,selectedSubject;

string specialCase;

int total; };

SpecialCase (if applicant has "Awardee of Olympiads", then this field is "true", otherwise "false").

Do not forget that all "Awardees of Olympiads" will gain grants automatically.
If the total points are same your algorithm have to choose an applicant with higher SelectedSubject (even with SpecialCase)
Assuming that you have only K grants to distribute.

Note: You have to design your program using structures and functions.


Input:
First line contains M(total amount of applicant) and K(amount of grants that have to be distributed) (0 < M < 1001) and (1<=K<=M).
Then N lines are provided in format described above.


Output:
K lines sorted by total points( Total Points = Subject1 + Subject2 + Subject3 + SelectedSubject ) in format:
ID Name Surname Total_sum_of_points

example of input:

(There can be any inputs, it's just one of an examples)

(No means that they are not "Awardee of Olympiads")

10 5
1 Kimmy Marrow 12 23 4 14 NO
2 Baythen Mcclay 6 6 19 3 NO
3 Christen Stew 11 7 3 5 NO
4 Plein Phillip 15 19 8 4 NO
5 Beist Constant 15 3 17 11 NO
6 Sam Said 7 17 18 1 NO
7 Maclay Istan 5 5 16 17 NO
8 Sara Agit 15 17 24 18 YES
9 Nicolya Kim 24 12 23 23 NO
10 Neit Dimond 22 1 18 7 YES

Output:

9 Nicolya Kim 82
8 Sara Agit 74
1 Kimmy Marrow 53
10 Neit Dimond 48
5 Beist Constant 46

 

In: Computer Science

This needs to be in Python and each code needs to be separated. Design a class...

This needs to be in Python and each code needs to be separated.

Design a class for a fast food restaurant meals that should have 3 attributes; Meal Type (e.g., Burger, Salad, Taco, Pizza); Meal size (e.g., small, medium, large); Meal Drink (e.g., Coke, Dr. Pepper, Fanta); and 2 methods to set and get the attributes.

Write a program that ask the user to input the meal type, meal size, and meal drinks. This data should be stored as the object's attributes. Use the object's accessor methods to retrieve the meal type, meal size, and meal drinks and display them as the output.

In: Computer Science

On a network with an IP address of 158.234.28.72 and a subnet mask of 255.248.0.0 what...

On a network with an IP address of 158.234.28.72 and a subnet mask of 255.248.0.0 what is the network ID and the broadcast address? Show your calculations.

In: Computer Science

A pension fund manager is considering three mutual funds. The first is a stock fund, the...

A pension fund manager is considering three mutual funds. The first is a stock fund, the second is a long-term government and corporate bond fund, and the third is a T-bill money market fund that yields a rate of 8%.

The probability distribution of the risky funds is as follows: Expected Return Standard Deviation Stock fund (S) 17 % 35 % Bond fund (B) 14 18 The correlation between the fund returns is 0.09. a-1. What are the investment proportions in the minimum-variance portfolio of the two risky funds. (Do not round intermediate calculations. Enter your answers as decimals rounded to 4 places.) a-2. What is the expected value and standard deviation of its rate of return? (Do not round intermediate calculations. Enter your answers as decimals rounded to 4 places.)

In: Finance

Complete the following sentence with the correct term. A manager with many direct subordinates has a...

Complete the following sentence with the correct term.

A manager with many direct subordinates has a wider __________(Options:span of management/accountability/authority/responsibility) than does a manager with only a few subordinates.

___________(Staff authority/Accountability/Work specialization/span of management) is involved when your manager reviews your performance and evaluates your outcomes.

Management at Work

Bricks ‘n’ Bats makes children’s toys. The CEO is reorganizing the company to adjust to several changes in the environment. One is the increasing sales of toys online instead of in brick-and-mortar stores. Another is a trend toward less gender orientation in the marketing of toys, as evidenced by Target’s decision to stop labeling many children’s products as for boys or for girls. Yet another change is parents’ growing preference for toys that allow their children to build or make unique creations as well as for educational toys that teach science, math, and other topics. As the CEO considers various organizational structures, he hires you as an expert consultant.

Answer the question posed by the CEO of Bricks ‘n’ Bats.

“Where would it make sense for managers to have wide spans of control?” Check all that apply.

In shipping, where most employees are very experienced and highly trained

In manufacturing, where most employees perform similar tasks that don’t change much over time

In logistics, where employees need to coordinate with several other areas to do their work

In marketing, where most employees and contractors work out of their homes located across the country

Management at Work

Brian, Cedric, Daesun, Nick, and Jake are wool blanket makers, all of whom perform the following steps each year:

1. Raise and take care of sheep
2. Shear sheep to obtain pounds of wool
3. Prepare wool to be turned into blankets
4. Weave blankets
5. Bring blankets to market for sale

Suppose Brian proposes that—instead of each man performing all five tasks—they divide the tasks so that Brian raises and takes care of all the sheep, Cedric shears the sheep to obtain the wool, Daesun prepares the wool to be turned into blankets, Nick makes the blankets, and Jake brings the blankets to market for sale.

The men agree to this proposal and find that specialization yields both positive and negative outcomes.

In the following table, indicate which of the following outcomes reflect likely benefits and which reflect possible drawbacks of the men’s new work structure.

Outcome

Benefit

Drawback

If it used to take each man 4 hours to monitor one fifth of the sheep, it now takes Brian less than 20 hours to monitor all the sheep.
The workers may focus on their own needs and not understand or be concerned with the needs of the four workers doing different jobs.

In: Operations Management

On a Class C network, how many hosts per subnet will you get if you have...

On a Class C network, how many hosts per subnet will you get if you have a subnet mask of 255.255.255.240. On how many subnets was divided this class C address? Show your calculations

In: Computer Science

1.        In your program, demo the split() method for strings and attach it to one of the...

1.        In your program, demo the split() method for strings and attach it to one of the buttons.

"Numbers" lesson

2.        Check if 3===3.0. Why?

3.        Find the number of zeros such that 3===3.000…01. Why can this happen?

4.    If var x=123e15, and var y=123e-15, does x===x+y? why?

5.    What is typeof NaN? Comment on its (il)logicality.

"Number Methods" lesson

6.    What is the hexadecimal number ff (written in JavaScript as 0xff) in base 10?

7.    Write all the numbers from 0 to 20 in hexadecimal form. If not sure you can always use a for loop and (if the index variable is i), print out i.toString(16).

8.    What is 0xff.toString()? Why?

9.    What is (35).toString(36)? Why?

10.    What is (35).toString(37)? Why?

11.    Give a call to alert() that gives $0.99 + 7% (sales tax, say) of $0.99.

12.    Why does (0.99+0.07*0.99).toFixed(2) give the price if it costs $0.99 + 7% sales tax?

13.    What is Number(true)?

14.    What is Number(undefined)? Why?

15.    What is parseInt(0xff)? Why?

16.    The Number entity contains useful stuff. What is the value of Number.MAX_VALUE? Is it big?

17. Consider the hexadecimal (base 16) number 9a. In a JavaScript program you would write it as: 0x9a. How would you write it in the more familiar base 10? Here is how to solve this.

a.       Recall that a "normal" base 10 number has a ones place, a tens place, a hundreds place, a thousands place, etc. Another way to put it is, it has a 100's place (100=1), a 101's (101=10), a 102's place (102=100), a 103's place (103=1,000), etc. Similarly, a base 16 number has a 160's place (160=1), a 161's (161=16), a 162's place (162=16x16=256), a 163's place (163=16x16x16=4,096), etc.

b.      So the base 16 number 9a has an "a" in the 1s place and a 9 in the 16s place.

c.       It has "a" 1s and 9 16s, so just calculate (a*1)+(9*16).

d.      What number is "a"? Well, base 10 numbers are made with 10 numeral symbols (0 1 2 3 4 5 6 8 9). Similarly, base 16 numbers are made with 16 numeral symbols (0 1 2 3 4 5 6 7 8 9 a b c d e f). An "e" for example has the value of fifteen. Base 2 numbers are made with 2 numeral symbols (0 1). Base 36 uses 36 symbols (0...9 and a...z). In everyday use we get up to base 60 (for measuring time at 60 seconds per minute, 60 minutes per hour) but rather than use 60 different symbols we use other means, as you might have noticed.

e.       You can check your answer in JavaScript using the toString() method:

var num = 128;
num.toString(16);

will provide a string for the base 10 number 128 rendered as a base 16 number. So you can see if toString() will convert your answer and give the string "9a". If it does, you got the right answer.

18.  So far we have looked at calculating a conversion from base 16 numbers into base 10. The same idea applies to converting any base into base 10. What is the base 8 number 7564 in base 10?

19.  What is the binary number 11101111 in base 10?

20.  Next, consider converting base 10 numbers into base 16 or any other base.

Calculate what the base 10 number 1000 is in base 16 (show your work, without using JavaScript). You can check your answer JavaScript using toString() if you like. Here's how to calculate it.

a.       163=4096, and there are no 4096s in 1000, so there is no fourth digit in the answer, since what you really need are the three digits for 162, 161, and 160. How many 162s are in 1000? 162=256, so the question then is how many 256s are in 1000? The answer is 3, with a remainder. So the partial answer is: 3 _ _ . Fill in the 2 blanks.

b.      The 3 is the number of 162s or 256s in 1000, which leaves 1000-3*256 = 232 unaccounted for.

c.       The next digit is for the number of 161=16s we need. We can fit 14 of them into 232: 14*16=224, with a remainder of 8 that is not yet accounted for. 14 is written "e" in base 16, so the answer so far is: 3e_ and we have one blank left to fill.

d.      The 160 or 1s place holds the number of 1s we need. 8 of them are needed to fill up the remainder of 8 that we have to deal with, so the answer is: 3e8. Thus

num = 1000;
num.toString(16);

should give the string "3e8".

21.  What is 2000 in base 16 (hexadecimal)? Calculate it without using JavaScript and show your work.

22.  Do this the fast way using toString(). What is the base 10 number 128 in base 2?

23.  Do this the fast way using toString(). What is the base 10 number 128 in base 36? toString() won't go above 36.

24.  What is 200,000,000 in hexadecimal? Do it the fast way in JavaScript unless you have a lot of extra time on your hands.

The "Random" lesson

25.  Check out https://www.w3schools.com/js/tryit.asp?filename=tryjs_random_function. Explain how it works.

26. Give a call to Math.floor() that returns a random integer from 1 to 10, inclusive (inclusive means it could return 1, 10, or any integer in between).

In: Computer Science

What is UDP and how does it work? What are the differences between TCP and UDP?....

What is UDP and how does it work? What are the differences between TCP and UDP?. Provide examples (if applicable) to support your comparative review.

In: Computer Science

I need it in java. Write a program that will print if n numbers that the...

I need it in java.

Write a program that will print if n numbers that the user will input are or not within a range of numbers. For that, your program needs to ask first for an integer number called N that will represent the number of times that will ask for other integer numbers. Right after, it should ask for two numbers that will represent the Min and Max for a range. Lastly. it will iterate N number times asking for an integer number and for each number that the user input it will present whether the number is or not within the Min-Max range (including their respective value). As an example, if the user inputs: "3 2 5 8 4 2" the output would be:

8 is not within the range between 2 and 5
4 is within the range between 2 and 5
2 is within the range between 2 and 5

In: Computer Science