Questions
May I get the output screenshot for the following source code: INCLUDE Irvine32.inc MAX_VALUE = 100...

May I get the output screenshot for the following source code:

INCLUDE Irvine32.inc
MAX_VALUE = 100
.data
str1 BYTE "Enter The character that want to display on Screen: ",0
char BYTE ?
rows BYTE ?
cols BYTE ?
randrow BYTE ?
randcol BYTE ?

.code
main PROC
mov edx, OFFSET str1
call writeString
call ReadChar
mov char, al

call crlf
call WriteChar
call crlf


mov eax,0
mov ebx,0
mov ecx,0
mov edx,0

call crlf

call GetMaxXY
mov rows,dh
mov cols,dl

call crlf
call crlf

mov eax,0
mov ebx,0
mov ecx,0
mov edx,0

;

mov ecx,MAX_VALUE   ;counter

L1:
movzx eax,rows
call RandomRange
mov randrow, al
;call WriteDec

call crlf
mov eax,0

movzx eax,cols
call RandomRange
mov randcol, al
;call WriteDec

call crlf
mov eax,0
mov ebx,0
mov edx,0


mov dh,randrow
mov dl,randcol
call Gotoxy

movzx eax,char
call WriteChar

call crlf
mov eax,0

loop L1
exit                      
;exiting main.
main ENDP
END main

In: Computer Science

Develop a set of test cases for the algorithm In a scheduling program, we want to...

Develop a set of test cases for the algorithm In a scheduling program, we want to check whether two appointments overlap. For simplicity, appointments start at a full hour, and we use military time (with hours 0–24). The following pseudocode describes an algorithm that determines whether the appointment with start time start1 and end time end1 overlaps with the appointment with start time start2 and end time end2.

If start1 > start2

s = start1

Else s = start2

If end1 < end2

e = endl

Else e = end2

If s < e

The appointments overlap.

Else The appointments don’t overlap.

Trace this algorithm with an appointment from 10–12 and one from 11–13, then with an appointment from 10–11 and one from 12–13.

In: Computer Science

Goldendoodle Puppy Contract This agreement is made this ____6th__day of _____March____ , __2020_____ , between Goldendoodles...

Goldendoodle Puppy Contract This agreement is made this ____6th__day of _____March____ , __2020_____ , between Goldendoodles Breeder (seller) and ___Jane Petowner___________(buyer). Buyer agrees to purchase from seller a Goldendoodle puppy Sex____Male___ Size___Mini_______ Color___apricot___________ Collar color_____white________ Born on_____1/17/20_____ for the amount of $2,000.00 plus Wisconsin state sales tax. Payment in full must be made prior to taking possession. Health Guarantee – Seller guarantees against any genetic defects that severely affect the quality of life of the puppy or causes the death of the puppy, for two years after date of purchase. Seller will refund 100% of the purchase price. Buyer must provide proof in writing from a licensed veterinarian (at buyer’s expense) and grant access to all veterinary records starting from the date of this contract. Seller has the right to a second opinion (at seller’s expense). Seller guarantees that upon receipt, the puppy is in good health and has been immunized and wormed according to accompanying health record. Any conditions that is minor, (including overbites or underbites) correctable, or will go away as the puppy gets older are not covered. The seller is not responsible for any harm that comes to the puppy once it leaves seller’s premises. The buyer agrees to take proper care of the puppy including: feed a quality food, provide regular veterinarian care including appropriate vaccinations and preventative medications, provide a safe environment, indoor housing, refrain puppy from any strenuous exercise and excessive jumping until one year of age. If the puppy is found to be in poor health, buyer will return the puppy (at buyer’s expense) with no refund to buyer. This guarantee is void if puppy is given any chewable medication for flea and tick medication. Rehoming – If for any reason buyer is unable to keep or care for the puppy, seller will take the puppy back, no questions asked and no refund will be given. Under no circumstance will the puppy be placed in an animal shelter, pet store, puppy mill, or any similar establishment. Spay/Neuter – This puppy is being sold as a pet only, unless breeding rights are purchased separately. Buyer agrees to have the puppy spayed/neutered by 8 months of age. Proof of spay/neuter must be in writing by a licensed veterinarian. Failure to comply will be considered breach of the contract and the health guarantee will be void. Buyer agrees to pay a $30,000 fine and all court costs and attorney fees if found to have bred puppy, intentionally or accidentally. Buyer will also return the puppy (at buyer’s expense) to seller. All contract disputes will be handled in the County of Washington, in the State of Wisconsin. All parties have read, understood and agreed to this contract in full. Seller_______Goldendoodles Breeder_____ Buyer_______Jane Petowner_

1. 5. Is specific performance of this contract available as a remedy to the buyer in the event the seller breaches by refusing to give possession to the buyer for no apparent reason? Why or why not?

In: Operations Management

Which of the following is part of the 3-tier architecture? 3 Correct Answers hardware layer application...

Which of the following is part of the 3-tier architecture?
3 Correct Answers

hardware layer

application layer

presentation layer

data layer

A company that utilizes software as-a-service (SaaS) must physically install the ES at their facility

True

False

Which of the following is not one of the five basic components of supply chain management?

Analyze

Deliver

Source

Plan

In: Operations Management

Case Study Terror at the Taj Bombay: Customer-Centric Leadership The night of November 26, 2008, 10...

Case Study

Terror at the Taj Bombay: Customer-Centric Leadership

The night of November 26, 2008, 10 armed individuals from the terrorist group Lashkar-e-Taiba (Army of the Righteous) entered the western-Indian city of Mumbai (formerly Bombay) to attack pre-determined locations, including the Taj MahalPalace and Tower (Taj Bombay). Over three nights and two days, terrorists killed 159 people and wounded 211 across the city. Of these, 34 people died and 28 were injured during the three-day siege of the Taj Bombay. The attacks, which became known in India as “26/11”, had a dramatic and lasting impact on the Indian national psyche.

However, the Taj Bombay received praise in the aftermath of the attach- specifically from hotel guests-for the quick-thinking actions of hotel staff to ensure the safety of hotel guests at the expense of their own personal safety. In addition to managing the emotional and psychological challenges of moving forward after the loss of employees and extensive physical da1nage to the hotel, senior executives wondered if the Taj brand would survive. Images of the Taj Bombay under attack were reprinted in newspapers and shown on television news stations worldwide. Executives had to decide when -and if -to re-open the hotel, whether to continue to use the Taj brand name, and what message to send out to consumers. The risk was to be viewed as insensitive by either avoiding the tragedy completely in their messages to the public or being seen as taking advantage of public sympathy in talking about the tragedy, and in deciding the right time to return to "business as usual" at the Taj Bombay.

  1. What specific actions do you take in both the short-term and long-term in rebuilding the Taj brand name?
  2. What would you do to recover from "being the living image of the terrorist attack" as Ratan Tata describes it? Is this even possible?

In: Operations Management

(C LANGUAGE) Write a function called upperLower that inputs a line of text into char array...

(C LANGUAGE) Write a function called upperLower that inputs a line of text into char array s[100]. Output the line in uppercase letters and in lowercase letters

This is what I have so far:

void * upperLower (const char * s) {
char *word[sizeof(s)];
for(int i = 0; i < sizeof(s); i++){
*word[i] = s[i];
}
word = strtok(word, " ");

int counter = 0;
while(word != NULL){
if(counter % 2 == 0){
word[counter] = toupper(word);
printf("%s ", word);
}
else{
word[counter] = tolower(word);
printf("%s ", word);
}
counter++;
word = strtok(NULL, " ");
}
}

The method cannot be changed. Must use void * upperLower (const char * s) {

The output should be like THIS is A test

In: Computer Science

What is additive strategies and provide a thorough example applying this strategy. Also, what is elimination...

What is additive strategies and provide a thorough example applying this strategy. Also, what is elimination by aspects and provide a thorough example applying this strategy.

In: Psychology

Design the logic for a program that allows a user to enter 10 numbers, stores the...

Design the logic for a program that allows a user to enter 10 numbers, stores the numbers in an array, then displays all of the numbers, the largest number, and the smallest.

 create a solution algorithm using pseudocode

 create a flowchart

In: Computer Science

problem should be done in C++ read in the adjacency matrix for a graph (with 5...

problem should be done in C++

read in the adjacency matrix for a graph (with 5 vertices) from a file, "adjacency.txt".  An example file is here:  adjacency.txt

This example file contains the following matrix:

1 2 4 1 0
2 0 1 1 3
4 1 2 1 0
1 1 1 0 1
0 3 0 1 3

Store the information in a 2D array.
to return the degree of a vertex in a generic graph.

For example, the following : 

cout << "vertex 3's degree:  " << vertexDegree(G,3) << endl;
cout << "vertex 4's degree:  " << vertexDegree(G,4) << endl;

should output:

vertex 3's degree: 4
vertex 4's degree: 10

thanks!

In: Computer Science

Decrypt as many letters and words as you can in the cipher text listed below. You...

Decrypt as many letters and words as you can in the cipher text listed below. You don’t need to explain, only bullet list the steps in the order that you take to decrypt this cipher-text.

Caesar cipher

ZQHCFWPFHPBFIPBQWKFABVYYDZBOTHPBQP

QJTQOTOGHFQAPBFEQJHDXXQVAV

XEBQPEFZBVFOJIWFFACFCCFHQWAUVWFLQH

GFXVAFXQHFUFHILTTAVWAFFAW

TEVOITDHFHFQAITIXPFHXAFQHEFZQWGFLVWPTHFTDPTOGHFQPBQWAQJJTODXQHFOQPWTBDHHIXQVA

In: Computer Science

In hot water heating systems; How can i do pipe calculations and how can i fill...

In hot water heating systems; How can i do pipe calculations and how can i fill the pipe chart ? Can u tell step by step ? In most general way.

In: Mechanical Engineering

Consider the following checkSum() method where N numbers are saved in an array (as sorted in...

Consider the following checkSum() method where N numbers are saved in an array (as sorted in as-
cending order). In the main() function, the user will input a number. The checkSum() method will

find out whether the sum of any two numbers in the array is equal to the given number by the user. You
need to solve the problem with minimum time complexity (low complexity will lead to higher marks!).

In: Computer Science

What are the main elements of a project reliability plan? To which other project plans should...

  1. What are the main elements of a project reliability plan? To which other project plans should it refer?

In: Mechanical Engineering

What factors might explain why couples who cohabit (live together) before marriage sometimes are not as...

What factors might explain why couples who cohabit (live together) before marriage sometimes are not as happy in their marriages as couples who do not live together before marriage?

In: Psychology

What factors might explain why many people feel uncomfortable about wives earning as much or more...

What factors might explain why many people feel uncomfortable about wives earning as much or more income than their husbands? How do you feel about this issue?

In: Psychology