Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Write a C program which will take numbers from the keyboard until user enter the negative number and display the max of these numbers

using

-while loop

-do while loop


Write a C program which will take 30 numbers from the keyboard and display the min of these numbers . By using

•for loop

•while loop

•do while loop


Write a C program which will print the pattern on monitor , the integer N will be taken from key board



1


12


123


1234


12345


_____


_____


12345____n


Come up with the remaining loop , flow , and example on each one .

1.while loop

2.do while loop

3.infinite loop


sum of powers:


you are given a list of integers L of size N.write a program to compute the value of SUM

SUM=x1pow1+x2pow2+x3pow3+---+xNpowN

where xi concatenated with powi is the i th element of the list L

and powj is a single digit number

i/p: the input contains space separated N integers

the o/p should be a single integer denoting SUM

L=[25]

o/p:x1=2 , pow1=5

SUM=2^5=32

i/p: 132 301

o/p:199


Create an abstract class 'Bank' with an abstract method 'getBalance'. Rs. 10000, Rs. 15000 and Rs.

20000 are deposited in banks A, B and C respectively. 'BankA', 'BankB' and 'BankC' are subclasses

of class 'Bank', each having a method named 'getBalance'. Call this method by creating an object of

each of the three classes.


1)     You have been asked to implement a user-interface component ButtonCanvas which is both a button that can be clicked by the user and a canvas which the user can draw on. Your existing code contains a Button class and a Canvas class. Both of this extend GuiComponent.

a)     ButtonCanvas should be built using multiple inheritance. What does this mean in this context?                                                                                                (3 marks)

b)     Give two reasons why this might be desirable.                                         (3 marks)

c)     Give two complexities that arise in this case                                             (3 marks)

d)     Java interfaces originally contained only abstract methods and static final fields. How did this restrictions avoid the complexities of extending multiple classes?


Two players are each given a set of 3 dice. The first player throws the 3 dice and the

numbers on the top face of each die is recorded. Then the second player similarly

throws his 3 dice and the numbers on the top face of each die is also recorded. The

two sets of readings are compared and a player is deemed to have won that round if

any of the following occurs: -


(a) A set of all same numbers are obtained e.g. all 1s, or all 2s, or any other number

therein. If both players fall into this scenario during that round, then it is a draw

for that round. If only one player throws all the same numbers, then he wins

that round.

(b) Both players throw their dice and obtained three different numbers. All three

numbers are totalled up and whoever has the larger total, wins that round.

However, if the total of both players are the same then it is a draw.

After N rounds, the first player to reach a total accumulated round wins of 10 is declared

the overall winner.


An organization is granted a block of addresses with the beginning address

150.25.0.0/24. The organization needs to have 3 subblocks of addresses to use in its three

subnets: one subblock of 11 addresses, one subblock of 40 addresses, and one subblock of

125 addresses. Design the network and plot it completely with respective subnets, IP range,

Network IDs


Create a program using C# that implements the stream ciphers Cryptographic method . A stream cipher method inputs digits, bits, or characters and encrypts the stream of data. The onetime pad is an example of a stream cipher.

In this formative you have been requested to create an application that will work as the One-time pad (OTP), also called Vernam-cipher or the perfect cipher. This is a crypto algorithm where plaintext is combined with a random key and generate a ciphertext

LATEST TUTORIALS
APPROVED BY CLIENTS