Since Vivian is using a search engine to find photos for a school project, the search engine tool that she can use to find photos she can legally copy and share is called license filter.
Can A person use licensable images for free?
You can, indeed. You can limit results such that only pictures with Creative Commons licenses, pictures with commercial licenses, or pictures with other licenses are displayed, as Go ogle describes on its Developers Blog. Simply use the Usage Rights drop-down filter when searching to accomplish this.
Therefore, Use the licensing filter to identify photographs that you are allowed to use, share, or change for either personal or commercial purposes. The Creative Commons licensing framework is the foundation of this filter. To obtain image results that are appropriate for your intended use, choose a filter option.
Learn more about search engine from
https://brainly.com/question/27965856
#SPJ1
Invented by the well-known quality control statistician dr. Kaoru ishikawa, what is the name of the analysis tool that provides a systematic way of looking at effects and the causes that create or contribute to those effects?.
The name of the analysis tool that provides a systematic way of looking at causes and effects that create or contribute to those effects is the Fishbone diagram, invented by Kaoru Ishikawa.
what is meant by the Fishbone diagram?
Team members can more accurately diagnose a disorder or problem by visualising its root causes using a fishbone diagram rather than just focusing on its symptoms.
What are the 5M's of the causes and effect diagram?
The "5 M's" of manufacturing—machine, method, material, man/mind power, and measurement/medium—are used to classify the causes in this case.
This tool was created by Kaoru Ishikawa and is also referred to as the fishbone diagram and the Ishikawa diagram because of the way it is shaped like a fish's skeleton. They are used to determine the various contributing factors (causes) to a problem (effect).
Hence, the name of the analysis tool is the Fishbone diagram.
To learn more about the Fishbone diagram from the given link
https://brainly.com/question/5993715
#SPJ4
rupesh is a network technician who has been tasked by his supervisor to configure the edge firewall of an office branch. his task is to focus on outbound traffic based on several factors, such as domain name, url, file extension, and certain keywords. what is he configuring the firewall to perform?
Rupesh configuring the firewall to perform packet header. The header and the payload are the two parts that make up each packet.
What is meant by an IP packet header?Both a header (20 or 24 bytes long) and contents are included in each IP packet (variable length). Along with other data that are used to route the packet, the header contains the source and destination IP addresses. The information is the content itself, like a list of words or a section of a website.
The header and the payload are the two parts that make up each packet. An IP address is similar to a computer's postal address, and it is contained in the header along with other details about the packet, including its origin and destination. The actual data is the payload.
Instructions pertaining to the data in the packet are contained in the header. A network packet operates by selecting the most efficient path to its destination. All of the other packets in a message follow this path, which increases the efficiency of network traffic in terms of distributing a load among various pieces of hardware.
To learn more about packet header refer to:
https://brainly.com/question/4297610
#SPJ4
write a declaration statement that creates a two-dimensional array referenced by a variable named grades. the array should store int values using 18 rows and 12 columns.
The array should store int values using 18 rows and 12 columns is int[][] grades = new int[18][12];
What is array?
An array is a type of data structure used in computer science that contains a set of elements (values and variables), each of which is designated by an array index or key. An array is stored in a way that allows a mathematical formula to determine each element's position given its index tuple. A linear array, sometimes referred to as a one-dimensional array, is the most basic sort of data structure. The memory addresses 2000, 2004, 2008,..., 2036 (or 0x7D0, 0x7D4, 0x7D8,..., 0x7F4) can be used to store an array with ten 32-bit (4-byte) integer variables with indices 0 through 9, where the element with index I does have the address 2000 + I 4). The first address, foundation address, and base address is the memory location of the first element of an array.
To learn more about array
https://brainly.com/question/28061186
#SPJ4
what does inheritance mean in object-oriented programming? a. ability of a class to derive members of parent class as a part of its definition b. mechanism to protect instance variables c. both deriving members of parent class and protecting instance variables d. none of the above
Inheritance means object-oriented programming is a. ability of a class to derive members of the parent class as a part of its definition.
Inheritance can be described as the assets that an individual bequeaths to their loved ones after they pass away. An inheritance may include cash, investments such as stocks or bonds, and other assets such as jewelry, automobiles, art, antiques, and real estate. The goal of inheritance is to create a new class (called child class or derived or subclass) from an existing class (called parent class or Base or Superclass). It means, the child class inherits the properties (methods and fields) of the parent class.
You can learn more about Inheritance means object-oriented programming at https://brainly.com/question/13106196
#SPJ4
The Euclidean algorithm - The Euclidean algorithm provides a wonderful way to calculate the greatest common factor of 2 numbers. The greatest common factor, which is the largest number that divides evenly into 1 or more numbers, is useful for reducing fractions. The Euclidean algorithm works by dividing 1 number by the other and finding the remainder. The 2 numbers are redefined, and then the process is repeated. The process ends when the remainder is equal to 0. Following is the pseudo code for the algorithm. In c++ Use 145 and 87 to test your program. The program will find the largest common factor of the numbers (the answer should be 29).
The pseudo-code of the algorithm will be:
Start
Set n1 equal to 145 and n2 equal to 87.
Divide n1 by n2 and find the remainder.
Set n1 equal to n2 and n2 equal to the remainder.
Repeat steps 2 and 3 until the remainder is equal to 0.
The greatest common factor is n1.
End
What do you mean by pseudocode?
In computer science, pseudocode is indeed a plain language description of a steps in an algorithm or similar system. Pseudocode frequently employs structural patterns of a conventional programming language, although it is designed for human interpretation rather than machine reading. It generally omits features necessary for computation of the algorithm, including such variable declarations and language-specific code. When possible, the programming language is supplemented by natural language description details or succinct mathematical notation.
To learn more about pseudocode
https://brainly.com/question/24735155
#SPJ9
Iuanyware is a ________ application that is designed to run within a computer browser such as firefox, chrome, opera, or edge.
Iuanyware is a service program made to function inside of a web browser like Firefox, Chrome, Opera, or Edge.
What is IUanyWare?
All IU staff, faculty, and students have access to IUanyWare. You can stream the IU-licensed apps and software you need from anywhere, on any device, without having to download, install, or use a VPN for each one.
A service program called iuanyware is designed to run inside a web browser like Firefox, Chrome, Opera, or Edge.
There is a service called IUanyWare that all IU employees, faculty members, and students can use. You can stream the IU-licensed programs and software you needed, without having to install anything, regardless of where you are or what device you're using.
To learn more about ' IUanyWare' refer to
https://brainly.com/question/28940270
#SPJ4
How do you manage your online presence? What kind of sites are you most active on, and what steps can you take to manage your image on these sites better?
Answer:
1. optimize your website to increase your online visibility and other search engines.
2. make your company information clear and prominent.
Though obvious, it's surprising how many businesses neglect to do make it easy to locate their business information. You should show:
company name
location, including city and state
contact information
overview of products and services
operating hours
3. provide useful content in your page
how many 2-to-4 decoders are necessary to create a 4-to-16 decoder? b. how many 3-to-8 decoders are necessary to create a 6-to-64 decoder? c. how many 1-bit 2-to-1 muxes are necessary to create a 1-bit 8-to-1 mux? d. how many 1-bit 2-to-1 muxes are necessary to create an 8-bit 2-to-1 mux?
You will require 16 (4 × 16) decoders to match the 256 outputs. In other words, you will require 16 times 4 inputs, or 64, but you only contain 8 inputs available.
What is meant by decoder?A decoder is a combinational logic-gate circuit. It is the antithesis of an encoder. A decoder circuit converts a collection of digital input signals into an equivalent decimal code of the output. For every 'n' inputs, a decoder generates 2n outputs. This article will discuss creating a circuit using a 3 to 8 decoder for a 4 to 16 decoder.
An encoder is a combinational circuit that turns a collection of signals into a code. For every "2n" inputs, an encoder circuit generates "n" outputs.
A decoder circuit for the greater combination is produced by combining two or more lesser combinational circuits. A 4 to 16 decoder circuit can be made using two 3 to 8 decoder circuits or three 2 to 4 decoder circuits.
When two 3 to 8 Decoder circuits are connected, the enable pin functions as the input for both decoders. When the enable pin of one 3 to 8 decoder circuit is high, the enable pin of another 3 to 8 decoder circuit is low.
To learn more about decoder circuit refer to:
brainly.com/question/20493746
#SPJ4
What are the importance of computer in electronics engineering
Computers play an important role in electronics engineering as they are used to design and test electronic components and systems. They are also used to control manufacturing processes and to automate test and measurement equipment.
What is electronics engineering?
Electronics engineering is a branch of electrical engineering that arose in the early twentieth century and is characterised by the use of active components like as semiconductor devices to amplify as well as control electric current flow. Previously, only passive devices also including mechanical switches, resistors, inductors, and capacitors were employed in electrical engineering. Analog electronics, digital electronics, consumer electronics, embedded systems, and power electronics are all covered.
To learn more about electronics engineering
https://brainly.com/question/28194817
#SPJ13
a word wide web server is usually set up to receive relatively small messages from its clients but to transmit potentially very large messages to them. explain which type of arq protocol (selective reject, go-back-n) would provide less of a burden to a particularly popular www server? g
The data link layer protocol would provide less of a burden to a particularly popular world wide web server.
Similar to the ftp daemon, a World Wide Web server is a program that responds to an incoming tcp connection and offers a service to the caller. To serve various types of data, there are numerous variations of World Wide Web server software.
Automatic Repeat Request, also called Automatic Repeat Query, is the acronym for this. An error-control technique called ARQ is applied in two-way communication systems. To achieve reliable data transmission through an unreliable source or service, it is a collection of error-control protocols. These protocols are located in the OSI (Open System Interconnection) model's Transport Layer and Data Link Layer, respectively. When packets are determined to be corrupted or lost during the transmission process, these protocols are in charge of automatically retransmitting them.
To know more about world wide web click on the link:
https://brainly.com/question/13211964
#SPJ4
write a sql statement to show the average item cost for each vendor. the output should list vendor company names, vendor phone numbers, and the average item cost
The SQL statement to show the average item cost of each vendor is avg(vendor_avg_item_cost).
GROUP BY Vendor_companyname, Vendor_phonenumber, Ven_avgcost
What is avg() function?
The syntax for the avg() function is as follows: SELECT AVG(column name) FROM table name; Data from a table can be retrieved using the avg() function and a SELECT query.
what is a GROUP BY statement in SQL?
Finding summary rows, such as "find the number of consumers in each country," is done with the GROUP BY statement, which groups rows with similar values. The COUNT(), MAX(), MIN(), SUM(), and AVG() aggregate functions are frequently used with the GROUP BY statement to group the result set by one or more columns.
Therefore, the SQL statement to show the average is avg().
To learn more about the SQL from the given link
https://brainly.com/question/27851066
#SPJ4
4. some computer systems provide multiple register sets. describe what happens when a context switch occurs if the new context is already loaded into one of the register sets. what happens if the new context is in memory rather than in a register set and all the register sets are in use?
if the new context is in memory rather than in a register set and all the register sets are in use it makes one of the contexts in a register set must be chosen and moved to memory, and the new context must be loaded from memory into the set. This process takes a little more time than on systems with one set of registers, depending on how a replacement victim is selected.
The register set of a processor can be shared into different register classes. A register class can be defined as the subset of the processor's register set, that can be viewed as homogeneous from the point of view of a certain instruction's operand or result.
You can learn more about The register set at https://brainly.com/question/28497132
#SPJ4
A student opens a recently purchased software package and begins reading the enclosed materials. what information might be included in the software license? check all that apply. ""this software can only be used on two computers."" ""this software will help you get a better grade in school."" ""this software cannot be shared with others."" ""this software can be shared with one other computer."" ""this software must be opened before the end of the year.""
When the student reads the enclosed materials of a recently purchased software license, the information he may expect pertains to options (a), (c), and (d).
A software license is a legal document that provides binding guidelines for the use and redistribution of software. All software licenses are not the same so as are not provided with the same terms and conditions regarding the use of the purchased software. But generally, all software licenses dictate basic terms giving rights to the users to use the purchased software on a limited basis.
According to the context of the given question, appropriate terms about the use of purchased software enclosed in the software license seem to be in options (a), (c), and (d) that the software:
'can only be used on two computers''cannot be shared with others''can be shared with one other computer'You can learn more baout Software License at
https://brainly.com/question/12928918
#SPJ4
mohammed needs to open a firewall port so that web traffic can be passed through the firewall. what protocol is used for web pages, and on which port does it work?
HTTP protocol with port number 80 is used to open a firewall port
What is an HTTP protocol?
An application-layer protocol called Hypertext Transfer Protocol (HTTP) is used to send hypermedia documents like HTML. Although it was created for web browser and web server communication, there are other uses for it as well.
Explanation :
Your computer sends network data identifying itself as traffic intended for port 80 of the web host whenever you want to view a website. The firewall on the web server is configured to allow incoming traffic to port 80, so it acknowledges your request (and the web server, in turn, sends you the web page in response).
How HTTP protocol controls the network traffic ?
By controlling network traffic, a firewall can assist in protecting your computer and data. By preventing unwanted and unsolicited incoming network traffic, it accomplishes this. By scanning this incoming traffic for malicious content like hackers and malware that could infect your computer, a firewall verifies access.
Thus we can conclude that at port 80 HTTP protocol is used
https://brainly.com/question/12921030
#SPJ4
according to the penal code, a server-seller who fails to meet a standard level of care that an ordinary person under similar conditions would meet, such as checking ids, calculating age, refusing to over-serve patrons, and looking for signs of intoxication is guilty of:
Answer:
criminal negligence
Explanation:
tcp aimd congestion control increases the congestion window size by a factor of two until a triple duplicate-ack occurs, then the congestion window is decreased linearly by 1 mss. group of answer choices true false
The answer is false. The reason is because when three or more duplicate ACKs are gotten in a row, it is a strong indication that a segment has been lost.
ACK means short for acknowledgement. An ACK packet is any TCP packet that acknowledges receiving a message or series of packets. The technical definition of an ACK packet is a TCP packet with the "ACK" flag set in the header. The abbreviation ACK is came from the Federal Aviation Administration's abbreviation for Nantucket Memorial Airport. It is the second busiest commercial airport in Massachusetts after Logan International Airport in Boston. Visitors to the island have a special connection to those three letters, A-C-K.
You can learn more about ACK at https://brainly.com/question/19101000
#SPJ4
a network administrator conducts a network assessment to determine where to implement a network intrusion detection system (nids). which sensor deployment option is most ideal if the admin is concerned about system overloads and resiliency in the event of power loss?
The sensor deployment option is most ideal if the admin is concerned about system overloads and resiliency in the event of power loss is option A.)Passive test access point (TAP).
What is Test Access Points (TAPs)?Sensor deployment is done to accomplish goals like expanding coverage, boosting connection, enhancing robustness, or extending the lifespan of a certain WSN.
Consequently, a sensor deployment strategy must be properly planned in order to accomplish such desired functions without going over the budget allotted.
The idea of Test Access Points (TAPs) is straightforward. A TAP is a piece of hardware that maintains network integrity while enabling uninterrupted traffic flow from ports A to B and B to A. It does this by continually and continuously creating an exact copy of both sides of the traffic flow.
Therefore, A device with no physical barrier between its network ports is referred to as a passive network TAP. This implies that even if the device loses power, network port traffic can continue to flow, maintaining the link.
Learn more about access point from
https://brainly.com/question/14781150
#SPJ1
See full question below
A network administrator conducts a network assessment to determine where to implement a network intrusion detection system (NIDS). Which sensor deployment option is most ideal if the admin is concerned about system overloads and resiliency in the event of power loss?
A.)Passive test access point (TAP)
B.) Active test access point (TAP)
C.) Aggregation test access point (TAP)
D.) Switched port analyzer (SPAN)/mirror port
write a program that counts the number of words, lines , and toal characters(not including whitespace) in a paper, assuming that consecutive worlds are separated either by spaces or end of line characters. it also calculates the average word length by dividing the total number of characters by total number of words.
Create a program that, assuming that subsequent words are separated by either spaces or end-of-line characters, counts the number of words, lines, and overall characters (excluding whitespace) in a paper.
What is the Line, Word, and Character Counting Program?1.WordCount.java Term papers with a specific word count are frequently assigned to students. The computer can help with the tedious task of counting words in a long paper.
2. Write a programme that counts the number of words, lines, and overall characters (excluding whitespace) in a paper, assuming that subsequent words are separated by either spaces or end-of-line characters. The average word length is calculated by dividing the total number of characters by the total number of words.
3. The data. The data is contained in the txtfile. Make a copy of the data file and save it in the program's project directory.
4.In addition to displaying the findings on the screen, write down the same information.
To learn more about 'Program' refer to
brainly.com/question/16397886
#SPJ4
we are trying to protect a household computer. we have implemented password-based authentication to protect sensitive data. which levels of attacker motivation can this authentication typically protect against in this situation? select all that apply.
The process by which authorized users can access a computer system and unauthorized users are prevented from doing so is referred to as user access security.
User access security describes the procedures used to allow authorized users to access a computer system while preventing unauthorized users from doing so. Understand, however, that user access security restricts even authorized users to those areas of the system that they are specifically allowed to use in order to make this distinction a little more practical (which, in turn, is based on their "need-to-know"). After all, there is no justification for allowing a Staff Payroll employee access to private student records.
Users, whether authorized or not, have rights as well, even while there is little doubt that an organization has the right to safeguard its computing and information resources through user access security measures. All users, including illegal hackers, must be made aware that the system is being watched and that any unauthorized behavior will result in punishment and/or legal action as judged necessary.
To know more about security click on the link:
https://brainly.com/question/28070333
#SPJ4
question 1 for an assignment you wrote the method sort largest depth in the class quakesortinplace to sort earthquakes by their depth from largest depth to smallest depth using the selection sort algorithm. modify this method to do exactly 50 passes and then modify testsort to run this method on the file earthquakedatadec6sample2.atom. the file may not be completely sorted as there are more than 50 quakes in the file. after running your program of 50 selection sort passes on this file, what is the depth of the last earthquake in the arraylist?
ArrayList is a class in the java.util package and a component of the Java collection system. In Java, it offers us dynamic arrays.
The depth of the last earthquake in the arraylist exists -100000.00.
What is meant by arraylist?ArrayList is a class in the java.util package and a component of the Java collection system. In Java, it offers us dynamic arrays. Although it might be slower than conventional arrays, it can be useful in programs that require a lot of array manipulation. Java contains a class like this.
A resizable array that is part of the java.util package is the ArrayList class. Built-in arrays have a fixed size, but ArrayLists have a dynamic size. An ArrayList can have elements added and removed as needed, which aids in memory management for the user.
The elements are kept in a dynamic array by ArrayList internally. Internally, LinkedList stores the elements in a double-linked list.
The depth of the last earthquake in the arraylist exists -100000.00.
To learn more about ArrayLists refer to;
https://brainly.com/question/26666949
#SPJ4
write a function called remove duplicates that accepts a list and returns a list containing the same elements in the same order but with duplicates removed. for example, if the argument is [7, 4, 2, 7, 2, 2, 9, 4], the returned list would be [7, 4, 2, 9].
The function that called remove duplicates that accepts a list and returns a list containing the same elements in the same order but with duplicates removed is def remove_duplicates(lst).
The method of obtaining the unique list from a list that may contain duplicates is the subject of this article. Remove duplicates from list procedure has a wide range of uses, thus understanding it is beneficial.
This is the simplest and quickest way to complete a specific activity. After eliminating the duplicates, it returns a dictionary that must be transformed into a list.
List in the beginning: [1, 2, 4, 2, 1, 4, 5]
[1, 2, 4, 5] is the list after deleting duplicate elements.
Depending on the elements contained in the list, its size, whether or not the element order should be retained, and the effectiveness of the removal method, duplicates can be removed from Python lists using a variety of techniques. These processes might be iterative, implement themselves using built-in functions, or import functionality from modules.
To know more about duplicates click on the link:
https://brainly.com/question/28609285
#SPJ4
you manage an active directory domain. all users in the domain have a standard set of internet options configured by a gpo linked to the domain, but you want users in the administrators ou to have a different set of internet options. what should you do?
We should create a GPO user policy for the administrators OU if we want users in the administrators OU to have a different set of internet options.
Group Policy Items (GPOs) A Group Policy object (GPO) is a group of Group Policy settings that specify how a system will operate and appear to a certain user group. A user configuration and a computer configuration are the two components, or nodes, that make up each GPO.
Software settings, Windows settings, and administrative templates are located on the first level under the User and Computer nodes, respectively. Windows Components, System, Network, and Printers can be found if we delve deeper into the Computer node's Administrative Templates.
Similarly, if we drill down into the User node's Administrative Templates, we discover several of the same folders in addition to some new ones, including Shared Folders, Desktop, Start Menu, and Taskbar.
To know more about GPO click on the link:
https://brainly.com/question/28206529
#SPJ4
write a program that determines the number of years it will take a home to double in value given the current value of the home and the predicted appreciation rate.
The program that determines the number of years it will take home to double in value is given below,
Example X
interleaved input and output with inputs 200000 and 0.042
Enter home value:200000
Enter appreciation rate (3.9% enter as 0.039):0.042
It will take about 17 years to double in value.
Example Y
interleaved input and output with an invalid input value:
Enter home value:20000000
Enter appreciation rate (3.9% enter as 0.039): unknown
Unexpected value: unknown
Algorithm
For example, for a home valued at $200,000 and a predicted appreciation rate of 3.9%, we could start writing the code as:
homeValue = 200000.0;
years = 0;
//after one year
homeValue = homeValue + homeValue * 0.039;
years++;
//after two years
homeValue = homeValue + homeValue * 0.039;
years++;
//after three years
homeValue = homeValue + homeValue * 0.039;
years++;
after 19 years the value is anticipated to be about $206,868, so it takes 19 years to double.
Construct the class HomeValue. Write a method within the class that returns the number of years it will take for the worth of the home to double, taking the present home value and the expected appreciation rate as inputs of type double.
Hence, the java program is given.
To learn more about the Java Program from the given link
https://brainly.com/question/26642771
#SPJ4
cmu 2.5.4 scoreboard i need help with all of cmu 2.5.4
Answer:
Explanation: i can not see your sreeen
what type of ip address would be assigned to a software-based load balancer to handle an internet site hosted on several web servers, each with its own private ip address?
A software-based load balancer would be assigned a public IP address.
What is IP-address?
The Internet Protocol address (IP address) is indeed a numerical label that identifies a computer network that employs the Internet Protocol for communication. An example of such an IP address is 192.0.2.1. Identification of the network interface and location addressing are the two primary purposes of an IP address. A 32-bit number is what the Internet Protocol version 4 (IPv4) specifies as an IP address. However, a new version of IP (IPv6), utilising 128 bits again for IP address, was established in 1998 in response to the expansion of the Internet and the exhaustion of IPv4 addresses. Deployment of IPv6 has been happening since the middle of the 2000s.
To learn more about IP-address
https://brainly.com/question/24930846
#SPJ4
your chief information security officer (ciso) wants to develop a new collection and analysis platform that will enable the security team to extract actionable data from its assets. the ciso would like your input as far as which data sources to draw from as part of the new collection platform, worrying that collecting from too many sources, or not enough, could impede the company's ability to analyze information. is this a valid concern, and how can it be addressed within an intelligence life-cycle model?
Yes, it is a valid concern. The requirements (or planning and direction) phase of the intelligence cycle is used to assess data sources and develop goals and objectives for making actionable intelligence to support the use of events demanded by intelligence consumers. You can also mention that the feedback phase of the cycle serves as the chance to review sources and determine whether they are delivering valuable intelligence.
CISO can be described as something that stands for the chief information security officer. CISOs work alongside company officers, business managers, cyber security teams, and IT managers to effectively monitor and maintain the security of their organization's applications, databases, computers, and websites.
You can learn more about Ciso at https://brainly.com/question/13261608
#SPJ4
Write a program that reads the student information from a tab separated values (tsv) file. the program then creates a text file that records the course grades of the students. each row of the tsv file contains the last name, first name, midterm1 score, midterm2 score, and the final score of a student. a sample of the student information is provided in studentinfo.tsv. assume the number of students is at least 1 and at most 20.
Using the knowledge in computational language in C code it is possible to write a code that write a program that reads the student information from a tab separated values (tsv) file.
Writting the code:#include<iostream>
#include<fstream>
#include<string>
#include<vector>
#include<sstream>
#include<iomanip>
using namespace std;
// Class student required to store the data
class Student{
public:
string lname;
string fname;
int marks[3];
char grade;
// Function which generates the grade for student
void calculate_grade(){
double sum = 0;
for(int i=0;i<3;i++){
sum+= marks[i];
}
double average = sum/3;
if(average>=90 && average<100)
this->grade = 'A';
else if(average>=80)
this->grade = 'B';
else if(average>=70)
this->grade = 'C';
else if(average>=60)
this->grade= 'D';
else this->grade = 'F';
}
};
// This function reads the file , and creates a vector of Students data
vector<Student> read_file(string fileName){
// Opening the file
fstream fin;
fin.open(fileName);
// Temp variables
vector<Student> list;
vector<string> row ;
string line, word, temp;
// Read the data into vector
while(getline(fin,line)){
row.clear();
stringstream s(line);
while(getline(s,word,'\t')){
row.push_back(word);
}
Student st;
st.fname = row[0];
st.lname = row[1];
st.marks[0] = stoi(row[2]);
st.marks[1] = stoi(row[3]);
st.marks[2] = stoi(row[4]);
st.calculate_grade();
list.push_back(st);
}
fin.close();
return list;
}
// This function takes filname to be output as input, and list of student
void writeFile(string filename, vector<Student> list){
// Opening the new file
ofstream fin(filename);
for(int i=0;i<list.size();i++){
string line = list[i].fname+"\t"+list[i].lname+"\t"+to_string(list[i].marks[0])+"\t"
+to_string(list[i].marks[1])+"\t"+to_string(list[i].marks[2])+"\t"+list[i].grade+"\n";
fin<<line;
}
// Find the stats required
double average1 =0,average2 =0 ,average3 = 0;
for(int i=0;i<list.size();i++){
average1+=list[i].marks[0];
average2+=list[i].marks[1];
average3+=list[i].marks[2];
}
average1/=list.size();
average2/=list.size();
average3/=list.size();
// Writting the stats
fin<<"\n"<<"Average: "<<"mid_term1 "<<fixed<<setprecision(2)<<average1<<", mid_term2 "<<setprecision(2)<<average2<<",final "<<setprecision(2)<<average3<<"\n";
// Closing the file
fin.close();
}
int main(){
// Taking the input
cout<<"Enter the filename: ";
string filename;
cin>>filename;
vector<Student> list;
// Reading and Writting to the file
list = read_file(filename);
writeFile("report.txt",list);
}
See more about C code at brainly.com/question/19705654
#SPJ1
write a program that records high-score data for a fictitious game. the program will ask the user to enter the number of scores, create two dynamic arrays sized accordingly, ask the user to enter the indicated number of names and scores, and then print the names and scores sorted by score in descending order.
#include <iostream>
#include <string>
using namespace std;
void initializeArrays(string names[], int scores[], int size);
void sortData(string names[], int scores[], int size);
void displayData(const string names[], const int scores[], int size);
int main()
{
string names[5];
int scores[5];
initializeArrays(names, scores, 5);
sortData(names, scores, 5);
displayData(names, scores, 5);
return 0;
}
void initializeArrays(string names[], int scores[], int size){
for(int i=0; i<size; i++){
cout<<"Enter the name for score #"<<(i+1)<<": ";
cin >> names[i];
cout<<"Enter the score for score #"<<(i+1)<<": ";
cin >> scores[i];
}
}
void sortData(string names[], int scores[], int size){
int temp = 0;
string tempStr = "";
for(int i=0; i < size; i++){
for(int j=1; j < (size-i); j++){
if(scores[j-1]< scores[j]){
temp = scores[j-1];
scores[j-1] = scores[j];
scores[j]=temp;
tempStr = names[j-1];
names[j-1] = names[j];
names[j]=tempStr;
}
}
}
}
void displayData(const string names[], const int scores[], int size){
cout<<"Top Scorers:"<<endl;
for(int i=0; i<size; i++){
cout<<names[i]<<": "<<scores[i]<<endl;
}
}
C++ Programming :
C++ is an object-oriented programming language which gives a clear structure to programs and allows code to be reused, lowering development costs. C++ is portable and can be used to develop applications that can be adapted to multiple platforms. Performance, effectiveness, and flexibility of usage were the design pillars of C++, which was created with systems programming, embedded, resource-constrained software, and big systems in mind. The software infrastructure and resource-constrained applications, such as desktop programmes, video games, servers, and performance-critical programmes, are two areas where C++ has been proven to be very useful.
C++ is standardized by an ISO working group known as JTC1/SC22/WG21. It has released six iterations of the C++ standard thus far and is now working on C++23, the upcoming revision. C++ was first standardised by the ISO working group in 1998 as ISO/IEC 14882:1998, also referred to as C++98. It released a revised version of the C++ standard in 2003 called ISO/IEC 14882:2003 that addressed issues found in C++98.
The two fundamental parts of the C++ programming language are a direct translation of hardware characteristics, mostly from the C subset, and zero-overhead abstractions built on top of those mappings. According to Stroustrup, C++ is ""C++" is a lightweight abstraction programming language that "offers both hardware access and abstraction" and is "built for creating and using efficient and elegant abstractions." Its ability to be done effectively sets it apart from other languages."
To learn more about C++ refer :
https://brainly.com/question/20339175
#SPJ4
C++ is an object-oriented programming language which gives a clear structure to programs and allows code to be reused, lowering development costs. C++ is portable and can be used to develop applications that can be adapted to multiple platforms.
How to Create C++ Program for High score data for a fictious?C++ is an object-oriented programming language which gives a clear structure to programs and allows code to be reused, lowering development costs. C++ is portable and can be used to develop applications that can be adapted to multiple platforms. Performance, effectiveness, and flexibility of usage were the design pillars of C++, which was created with systems programming, embedded, resource-constrained software, and big systems in mind.
The software infrastructure and resource-constrained applications, such as desktop programmes, video games, servers, and performance-critical programmes, are two areas where C++ has been proven to be very useful.
#include <iostream>
#include <string>
using namespace std;
void initializeArrays(string names[], int scores[], int size);
void sortData(string names[], int scores[], int size);
void displayData(const string names[], const int scores[], int size);
int main()
{
string names[5];
int scores[5];
initializeArrays(names, scores, 5);
sortData(names, scores, 5);
displayData(names, scores, 5);
return 0;
}
void initializeArrays(string names[], int scores[], int size){
for(int i=0; i<size; i++){
cout<<"Enter the name for score #"<<(i+1)<<": ";
cin >> names[i];
cout<<"Enter the score for score #"<<(i+1)<<": ";
cin >> scores[i];
}
}
void sortData(string names[], int scores[], int size){
int temp = 0;
string tempStr = "";
for(int i=0; i < size; i++){
for(int j=1; j < (size-i); j++){
if(scores[j-1]< scores[j]){
temp = scores[j-1];
scores[j-1] = scores[j];
scores[j]=temp;
tempStr = names[j-1];
names[j-1] = names[j];
names[j]=tempStr;
}
}
}
}
void displayData(const string names[], const int scores[], int size){
cout<<"Top Scorers:"<<endl;
for(int i=0; i<size; i++){
cout<<names[i]<<": "<<scores[i]<<endl;
}
}
C++ is standardized by an ISO working group known as JTC1/SC22/WG21. It has released six iterations of the C++ standard thus far and is now working on C++23, the upcoming revision. C++ was first standardised by the ISO working group in 1998 as ISO/IEC 14882:1998, also referred to as C++98. It released a revised version of the C++ standard in 2003 called ISO/IEC 14882:2003 that addressed issues found in C++98.
The two fundamental parts of the C++ programming language are a direct translation of hardware characteristics, mostly from the C subset, and zero-overhead abstractions built on top of those mappings. According to Stroustrup, C++ is ""C++" is a lightweight abstraction programming language that "offers both hardware access and abstraction" and is "built for creating and using efficient and elegant abstractions." Its ability to be done effectively sets it apart from other languages."
To learn more about C++ refer to:
brainly.com/question/20339175
#SPJ4
Which feature in microsoft word gives you the option to increase or decrease the indentation of items in a bulleted list or numbered list?.
Answer:
These icons.
Explanation:
You can these icons that are in the paragraph section or you can use the tab/delete keys on the keyboard
what component at the core of the erp system allows all business functions to access current and consistent data for operational decision making? group of answer choices general ledger database reports pos device
The component at the core of the ERP system that allows all business functions to access current and consistent data for operational decision making is option B: database.
What is at the core of an ERP system?ERP, at its heart, is a program that streamlines business operations and offers internal checks and balances. It does this by utilizing a centralized database that compiles data from several departments, including accounting, production, supply chain management, sales, and marketing (HR).
Companies need any ERP software solutions since they assist in the implementation of resource planning by combining all business operations into a single system. A software system for enterprise resource planning (ERP) can also incorporate planning, inventory buying, sales, marketing, finance, and other functions.
Note that a database is a planned grouping of material that has been arranged and is often kept electronically in a computer system. A database management system often oversees a database (DBMS).
Learn more about database from
https://brainly.com/question/518894
#SPJ1