Hollow Rectangle - 2
Write a program to print a rectangle pattern of M rows and N columns using the characters as shown below.
The first line of input is an integer M. The second line of input is an integer N.
Explanation
In the given example,
3 rows and 10 columns.
Therefore, the output should be
+----------+
| |
| |
| |
+----------+
Sample Input 1
3
10
Sample Output 1
+----------+
| |
| |
| |
+----------+
Sample Input 2
5
10
Sample Output 2
+----------+
| |
| |
| |
| |
| |
+----------+
Composite Number
Given an integer N, write a program to find if the given number is a composite number or not. If it is composite, print True or else print False.
Input
The first line of input is an integer N.
Output
The output should be True or False.
Explanation
In the given example,
12 is a composite number as it can be divisible by 1, 2, 3, 4, 6, 12.Therefore, the output should be
True.
Sample Input 1
12
Sample Output 1
True
Sample Input 2
3
Sample Output 2
False
Write a program to perform transpose for a given sparse matrix. ( Row major order)
BankZero allows all its clients to open accounts, increase their limits, and conduct high mount transfers irrespective of bank balance. Furthermore, once users are logged in, they can perform all other transactions with no restrictions. Is this bank violating any of the pervasive security principles? Support your answer by discussing those principles that are not being adhered to
Write a program in C++ to create a class to take student subject marks and name (dynamically as per users input) for two students at the time of creation of objects. Display the details of two students along with the average mark by calling member function.Also deallocate the memory using destructor function.
1. Describe fundamental concepts in computer programming.
2. Differentiate between high and low-level languages.
3. Demonstrate basic debugging techniques.
4. Develop simple calculations in Python.
A person who lives in Bangalore travels to Pune with his laptop. The LAN at his destination in Pune is a wireless IP LAN, so he does not have to plug in.
a) Is it still necessary to go through the entire business with home agents and foreign agents to make email and other traffic arrive correctly? Explain it.
b) When the IPv6 protocol is introduced, does the ARP protocol have to be changed? If
so, are the changes conceptual or technical?
c) Generate the checksum for the two 16 bit data: 1101010110110100 and 1110100010101111
Develop pseudocode of following operations for Doubly Circular Linked List.
i) Insertion of a node at beginning.
ii) Insertion of a node at end.
iii) Deletion of first node.
iv) Deletion of last node.