every line and it splits the line by comm
Q: es of equation solutions need numerical approxi
A: Introduction: Below describe the equation solutions need numerical approximation
Q: Static data members and static member functions aren't precisely what I'm looking for
A: Static variables: Static variables in a function: space is reserved for it throughout the program's…
Q: Compilers often only support a subset of grammars in their parsing algorithms.
A: The compiler use a parsing method for the following reasons: Parsing is the act of breaking down a…
Q: Use your own words to describe the differences between the OSI and TCP/IP models. It's not clear to…
A: The significant differences are as follows: - The TCP/IP paradigm was developed by ARPANET (Advanced…
Q: using python, show how to convert Tuple type to Series
A: The conversion of tuple in series can be done in many ways. One of them is by using data frame…
Q: What steps did the bank take to prevent, detect, and respond to the intrusion?
A: Detection Mostly banks use IDS (Intrusion Detection System) to avoid any type of intrusion from…
Q: What are some ways to describe the distinction between the structure of a file and the structure of…
A: File structure contains many files in which each file is divided into many blocks. These files are…
Q: Who are the people using the SRS document? In addition, the purpose of utilising SRS should be made…
A: Given: A software requirement specification (SRS) is a full statistics/description of a…
Q: Give an example to show how to convert Dict type to Series? Give an example to show how to convert…
A: Since you have asked multiple questions we will answer the first one only. If you want any specific…
Q: Why is it so important not to stack boards on top of each other when disassembling a computer?
A: Answer: At the time of taking computers apart, it is very dominant not to pile the boards on top of…
Q: Many new and better features have been added to Microsoft Excel 2016. What feature of Excel 2016 do…
A: 3D data Maps: 3D data Maps are a useful feature in MS-Excel 2016. The 3D data map was originally an…
Q: Explain why user-defined functions are better than pre-defined ones.
A: Function: A function is a reusable, ordered chunk of code that performs a single connected activity.…
Q: 28. In a linear linked list, a. the next pointer of each node has the value NULL b. the last node…
A: Given question are multiple choice selected question.
Q: Do you know what the TCSEC orange book is about?
A: TCSEC full form is Trusted Computer System Evaluation Criteria
Q: *the interrupt process is disabled using EI O FIO DE O None of them
A: EI stands for "Enable Interrupt". The 8085 processor's interrupt system is enabled by using the EI…
Q: Inquire as to the usefulness of comparing items using Euclidean distance and whether or whether this…
A: Given: Examine the applicability of similarity/dissimilarity based on Euclidian distance and whether…
Q: Describe the architecture of unified memory.
A: Unified memory: Unified memory reduces data duplication across CPU, GPU, etc. memory regions. Slow,…
Q: what four sources can the tournament team get information to develop the WBS? How can the…
A: The information sources that tournaments team require to develop the WBS are : 1) Scholarly Journals…
Q: What are the output of the following pseudocode: Step 1 Start Step 2 A= 22; B=23 Step 3 If A> B then…
A: The answer will be 23 (option 3) Screenshot of the program In the given question, programming…
Q: In order to better understand the CFG standards, could you please provide an example and an…
A: Required: Give an example of "semantic augmentation" for CFG (Context Free Grammar) rules. CFG…
Q: convenient subroutine has a single entry point only a single exit point only O both of them
A: Subroutine is a sequence of program instructions which performs a specific task. This subroutine is…
Q: Which protocol is qualified to transmit VolP through a connection to Metro Ethernet?
A: To be decided: Which protocol allows VoIP to be delivered over a Metro Ethernet connection?
Q: ROHIT SHARMA HAS BEEN THROUGH HIS SCORING CARD IN PREVIOUS WORLD CUP GAMES. HE HAS PLAYED A TOTAL OF…
A: Details for the program First line contains an integer N, denoting the number of world cup matches.…
Q: What are the recommended practises to take in the event of a healthcare data breach?
A: Healthcare Data breach: A data breach occurs when a third party with malicious intent exposes…
Q: How does one go about picking a good model for a given system?
A: The procedures for selecting an acceptable model for the system are outlined below. The project's…
Q: Examine the effects of both underfitting and overfitting a model.
A: Answer: Consequences of Underfitting a model When the model is not able to catch the trend of…
Q: There are two distinct categories of online services that may be accessible via the use of various…
A: Given: People and organisations may access services like email and the World Wide Web by connecting…
Q: Code optimization and the usage of Abstract Syntax Trees (AST) by compilers are two reasons for…
A: Given: Why do compilers optimize the code that they create, and why do they use Abstract Syntax…
Q: In order for a CPU to produce instructions, what is the only programming language that it can…
A: Introduction: An operating system is one of the software programs which works as a middle layer…
Q: If we have Const Pie = 3.14, what is the expression: Pie = Pie + 1 value of this
A: Introduction : In this question we have to find out the value of the expression after the addition…
Q: Is it possible for data to be compromised using cloud-based security solutions? Is there anything…
A: Given Is there a chance that a data breach might have a significant effect on the security of cloud…
Q: A binary symmetric channel has a chance p = 0.002 of incorrectly transmitting a single bit. Let w =…
A: Given : Probability of error = 0.002 Probability of no error = 0.002 w = 10100011
Q: Whether or not the order in which parameters are specified when invoking a function that accepts…
A: Introduction: Python functions are the Python representation of a program's procedures. While the…
Q: Describe at least four of the ways that you make use of information and communications technology in…
A: Introduction: Information and communication technology (ICT) is becoming more and more significant…
Q: Another stepping mode used to Create a program that utilizes this mode for a stepper motor. Use a…
A: it is aurdino code If conditioning is more than enough on the code part.
Q: Systems analysts must always be aware of the needs of the end users.
A: Systems analysts The primary a responsibility of a systems analyst is to investigate the issues and…
Q: two different ways to select subset of rows from a dataframe data.
A: Code: import pandas as pd # Reading csv file datadf = pd.read_csv("aqua.csv") # subset of rows from…
Q: Overloading is what? Compared to coercion and polymorphism, how is it different from this?
A: Introduction: Overloading is a kind of polymorphism, where the marked part should shift.…
Q: Whether or not the order in which parameters are specified when invoking a function that accepts…
A: Introduction: Python functions are the Python representation of a program's procedures. While the…
Q: It is the focus of this article how computers are used in Kenyan health care today.
A: The use of computers in healthcare has had a significant influence on Kenya's healthcare delivery.…
Q: * addressing mode consists of instruction code only......... direct addressing mode indirect…
A: the correct answer of the question is given below
Q: Undo statistics are used to fine-tune the undo tablespace. Do undo tablespaces provide any useful…
A: Undo data: Oracle Database makes a copy of the original data before making any changes to it in the…
Q: descriptive models are preferable than prescriptive models; nevertheless, which one is better?
A: Descriptive model:- A descriptive model is a mathematical model which describes the entity or the…
Q: Watch the NSLOOKUP video in this week's module, and as you watch the video, answer the following…
A: 1)IPv4 address of 'a' root server = 198.41.0.4
Q: are and contrast on laptop vs pc - the better choi
A: Introduction: Below describe compare and contrast on laptop vs pc which one is better
Q: In general, descriptive models are preferable than prescriptive models; nevertheless, which one is…
A: Descriptive or Prescriptive models: Prescriptive models are used for implementation, while…
Q: In Java, how does an object become serialised?
A: The solution to the given question is: The term "serialization" refers to the process of converting…
Q: Using the results of annual polls and surveys commissioned by firms that market agile solutions,…
A: Agile methodology: A project may be managed by segmenting it into several stages using the agile…
Q: Refine the algorithm successively to get step by step detailed algorithm that is a .computer…
A: Introduction: A grouping or sequencing of exercises to be handled for getting the wanted yield from…
Q: In what ways may I obtain assistance with Excel's functions?
A: Visit the official Microsoft help page to learn more about the various functionalities of Excel.…
please create a method to read the file in every line and it splits the line by comma in java
Step by step
Solved in 2 steps
- *CODE SHOULD BE IN JAVA* A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries. Use the following names and phone numbers: Name Phone # Gina (847) 341-0912 Marcia (847) 341-2392 Rita (847) 354-0654 Jennifer (414) 234-0912 Fred (414) 435-6567 Neil (608) 123-0904 Judy (608) 435-0434 Arlene (608) 123-0312 LaWanda (920) 787-9813 Deepak (930) 412-0991File Factorials.java contains a program that calls the factorial method of the MathUtils class to compute the factorials of integers entered by the user. Save these files to your directory and study the code in both, then compile and run Factorials to see how it works. Try several positive integers, then try a negative number. You should find that it works for small positive integers (values < 17), but that it returns a large negative value for larger integers and that it always returns 1 for negative integers. Returning 1 as the factorial of any negative integer is not correct—mathematically, the factorial function is not defined for negative integers. To correct this, you could modify your factorial method to check if the argument is negative, but then what? The method must return a value, and even if it prints an error message, whatever value is returned could be misconstrued. Instead it should throw an exception indicating that something went wrong so it could not complete its…Program62.javaWrite a program that prompts for a full name (first and last) and assigns it to one string. The program then passes the full name to a void method as its sole parameter. The void method should print the first name, on one line, as many times as indicated by the length of the last name. Sample Output (image below)
- In python The text file “studentMarks.txt” has been provided for you. Each line contains the Last Name, First Name and 8 marks separated by spaces of a single student. For each student in the file, adjust the file to include the average of their top 6 marks, rounded to 1 decimal place, at the end of the line. For example, in the file, the line may say: Mars, Bruno 82 82 85 94 65 79 81 90 Afterwards, it should be updated to say: Mars, Bruno 82 82 85 94 65 79 81 90 Top6Avg: 85.7 Your program must define a function to determine the average of the top 6 marks. You may define more functions as needed for your program.8. Write a C# program to find the lowest and largest values from three integer values entered by the user? 9. Write a C# program to find the sum of all the elements of an array of integers. Write a method (function) that take three numbers, x, y and z, and 10. return the sum of them?NOTE: JAVA language Write a program that asks the user for his first name and then prints it using a function/method called printName(). We do not expect the first name to exceed 20 letters. Then the program should print the name with a space between each character. Example: if the first name is Maryam, the :program will print Maryam -1 Maryam -2
- USE JAVA Write the code for this program to work: A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries. Use the following names and phone numbers: Name Phone # Gina (847) 341-0912 Marcia (847) 341-2392 Rita (847) 354-0654 Jennifer (414) 234-0912 Fred (414) 435-6567 Neil (608) 123-0904 Judy (608) 435-0434 Arlene (608) 123-0312 LaWanda (920) 787-9813 Deepak (930) 412-0991 An example of the program is shown below: Enter name to look up. Type 'quit' to quit. Gina Gina's phone number is…Java: Write a static method named textCount that takes a Scanner representing a file as a parameter and that reports various statistics about the file. In particular, your method should report the number of lines in the file, the total number of characters (not counting any new-line \n characters) in the file, and the length and text of the longest line. You may assume that the input file has at least one line of input. For example, if the file contains the following text: Twas brillig and the slithy toves did gyre and gimble in the wabe. All mimsey were the borogroves, and the mome raths outgrabe. "Beware the Jabberwock, my son, the jaws that bite, the claws that catch, Beware the JubJub bird and shun the frumious bandersnatch." The program would find that there are 9 lines (blank lines count), a total of 254 characters in the file (33 on the first line, 32 on the next line, 31 on the next line, 28 on the next, 0 on the next, etc) and that the longest line is the one that begins…IN JAVA Create a function that takes a string and returns the number of alphanumeric characters that occur more than once. Examples duplicateCount ("abcde") → 0 duplicateCount ("aabbcde") → 2 duplicateCount ("Indivisibilities") → 2 duplicateCount ("Aa") → 0 // Case sensitive
- NOTE: The Array, ArrayList or List class may not be used Write a program that will create an invoice for a customer order based on their requests. Your program should prompt the user for their requested items based on a stock number then store the associated information in an array to be displayed in the invoice. 1. Define a Java class as described below. All variables should be declared as private and all methods as public. Save the class definition in a file with an appropriate filename. Class Name: Inventory Instance Variables: itemName - String price - double quantity - integer Instance Methods: A default constructor A constructor that accepts three arguments, one for each of the fields. getter methods for each of the class fields. toString() A method to display the fields of an instance of the class in to be displayed on the order sheet. Compile and debug the above code. 1. Then, create a class, TestInventory that contains a main() with static methods to create an invoice using…Please do in Java In many computer systems and networks,different users are granted different levels of access to different resources. In this case, you are given a int[] rights, indicating the privilege level of each user to use some system resource. You are also given a int minPermission, which is the minimum permission a user must have to use this resource. You are to return a String indicating which users can and cannot access this resource. Each character in the return value corresponds to the element of users with the same index. 'A' indicates the user is allowed access, while 'D' indicates the user is denied access. Constraints users will contain between 0 and 50 elements, inclusive. Each element of users will be between 0 and 100, inclusive. minPermission will be between 0 and 100, inclusive. Examples a) {0,1,2,3,4,5} 2 Returns: "DDAAAA" Here, the first two users don't have sufficient privileges, but the remainder do. b) {5,3,2,10,0} 20 Returns: "DDDDD"…In Java A comma separated value (.csv) file has been included to be used for this program. Each line contains two values, a name and a number separated by a comma (except the first line, which contains the titles for the value types). The name is that of a writer and the number refers to the number of works the writer has written. Ex. Jane Austen,6. Each line is an entry and each entry number can be updated by identifying the associated name. Once complete, the following program opens data file allWorks.csv and asks if the user wants to update entries or add new entries. All entries are stored in an array while being read in and updated. The program then writes the array to the file, overwriting the original contents. The following TODO sections must be completed. Open allWorks.csv for reading/input. Locate an entry to be updated by name (use the Java String indexOf() method) Add a new entry if the name isn't found in the file (give the entry a new number) Open file allWorks.csv for…