Using java: Display how many are positive and negative numbers in the two-dimension array. 2 -6 8 3 -12 32 -54 -5 -4 4 12 45 31 2 -6 9. -4 -1 2 1 -2 1 6. -7 8 8 -7
Q: What exactly are CASE tools? What exactly is a CASE repository, and how does it work?
A: Intro the above question is about what exactly are CASE tools What exactly is a CASE repository, and...
Q: For this assignment *c++ & no ifstream, you need to build a class that contains basic information ab...
A: Here I have provided code in which you can do changes as per your need. Code:- // Include all the n...
Q: Computer science 1. Describe the benefits and drawbacks of circuit-switched networks.
A: Introduction: It operates on a set bandwidth. A dedicated communication channel improves communicati...
Q: What is the definition of a snooping protocol?
A: Introduction: A snooping protocol, sometimes known as a "bus-snooping protocol," maintains cache coh...
Q: Write a Java Program to take a string from the user front and back. take the first 2 chars and retur...
A: Given: To write a java program to take a string from the user , take the first 2 chars and return t...
Q: Do question 4-2, but change the RTL statement to the following. RO + R5 T1: TO: R1 E R5 T2: R2 + R5 ...
A: In order to transfer the 8-bit data of R5 to any of the four registers. The most useful combinationa...
Q: #MyCode n = int(input("Input the size of the matrix: ")) list1 = [] #To store the sum of each row ...
A: The above given question to find out the necessary modifications for the above given python code sni...
Q: 1. Ask how many pasties are being purchased. Use a loop to ask for the flavor and price of each past...
A: while(True): flav_list = [] flav_price = [] print("Welcome to Andy's Cornish Pasties!") ...
Q: Any three points about software measurement and metrics
A: software measurement
Q: Choose a number and apply the following operations to it. Divide the number by 2, and add 3 from the...
A: Inductive Reasoning is the method in which we assume some particular number and then derive the rela...
Q: What is the best way to acquire a complete list of all the files in your current directory, includin...
A: Introduction: The command "ls" has a number of arguments that influence the output when copied. The ...
Q: What exactly is in the EULA?
A: An End-User License Agreement or EULA is a legal contract between the owner of a product and the end...
Q: separate data in a spreadsheet after it has been exported to a text file with the.csv extension, wha...
A: It is defined as a comma-separated values file, which allows data to be saved in a tabular format. C...
Q: Create a function that removes the correct members from the input. Use the following examples to unl...
A: Algorithm: Firstly we will take the string as an function arguments then we will split the string w...
Q: JOY is a CS (B.TECH) student and now has days she wants to work on marketing. AND you are trying to ...
A: Introduction: It is used to perform large tasks (think thousands or millions of records!) That will ...
Q: "); YourNames.add("Huda"); YourNames.add("Seham"); YourNames.add("Yusra"); YourNames.add("Mohammed "...
A: 1. Write a Java Program to arrange the following names in Ascending order using Heap Sort algorithm ...
Q: What is the theta notation of f (n) +g (n)? f (n) = 0 (1) 9 (n) = e (n') O (n²) e (n) O 0 (n) O e (n...
A: Given theta functions are f(n) = Theta(1) g(n) = Theta(n²)
Q: which can hold maximum (MAX) of six elements: Add 10 Add 20 Remove(delete) Add 30 Add 40 Remove(dele...
A: In queue, the element are stored in first in first out strategy. When we add an element, rear pointe...
Q: Create a function that removes the correct members from the input. Use the following examples to unl...
A: Process : Firstly we will take the string as an function arguments then we will split the string wit...
Q: Please create a program in Java which will include a method that will merge sort an array of strings...
A: The code is given in the below step
Q: Compile the following C code snippet with optimization level O0 and O1 using armv7-a clang 11.0.1 co...
A: Explanation: Some changes must be made to the code for performing optimization. The main function s...
Q: And why are they regarded computer agents? Which of the following can be considered computing agents...
A: Introduction: Agent, sometimes dubbed softbot ("software robot"), is a computer programmed that cont...
Q: Excel by Microsoft When is it permissible to remove a whole row or column rather than only the da...
A: Intro Microsoft Excel When is it appropriate to delete an entire row or column, as opposed to d...
Q: Create a task that takes a series of words and returns the highest score of goals. Each letter of th...
A: Algorithm - Created a Method with argument. use the logic in the below argument. for(var ndx =...
Q: IN ΡYTHON WAP to input a string s from the user and check whether the string ends with "thon" or not...
A: The above question that is given is answered in below step i write the code in python and shows the...
Q: Suppose x and y are integer variables, consider the following if ( x> 9) y = 5; else if ( x <9) if (...
A: Answer is option e y = 8 ========== Explanation ========= int x = 9, y; if(x > 9) ...
Q: A port scanner may be used by an attacker to detect potential flaws in a potential victim's device. ...
A: Port Scanner: A virtual location where networking contact takes place is referred to as a terminal....
Q: Compare the transactional and analytical approaches to data manageme
A: Introduction: Compare the transactional and analytical approaches to data management.
Q: Describe why system calls are required to establish shared memory between two processes. Is it neces...
A: Intro Describe why system calls are required to establish shared memory between two processes. Is it...
Q: Computer science indicate whether you'd want it on-premises or in the cloud.
A: Introduction: On-Premise: The enterprise is responsible for maintaining the information and resource...
Q: What does the term "dual-channel memory architecture" mean?
A: Introduction: Here we are asked what does the term dual channel memory architecture mean.
Q: Draw an ER Diagram: A suspect steals at least one car and may steal many cars. A car is stolen by on...
A: answer is
Q: list 1 2 4 Next Next Next Next Next Prev Prev Prev Prev Prev After each of the following assignments...
A:
Q: The field of computer science What are the many functions in the cybersecurity sector, as well as th...
A: Introduction: IT What responsibilities do governments, corporations, and people play in cybersecurit...
Q: Given this code: https://pastebin.com/vuEdghU6 Determine: 1. The recurrence relation 2. Worst - c...
A: Given code contains a bar and inside the bar function, that function is recursively called 4 times. ...
Q: Create a function that removes the correct members from the input. Use the following examples to unl...
A: Algorithm - Created a Method with argument. use the logic in the below argument. - for (var i =...
Q: What do the Instruction Queue's functions entail?
A: Introduction: The CPU fetches instructions into an instruction queue, which is a structure. A separa...
Q: Question: - JOY is a CS (B.TECH) student and now has days she wants to work on marketing. AND you ar...
A: Used to perform large tasks (think thousands or millions of records!) That will exceed the normal pr...
Q: Which industry do you want to use data mining in?
A: Introduction: Data mining techniques are used in a variety of domains, including mobile service prov...
Q: At the IT consulting firm where you work, there is a heated dispute going on. Some members of the te...
A: Introduction: Problems may develop at first due to reluctance to change, but strong analytical skill...
Q: 1a.what is the output of these 2 programs #include main() { int i=0; for( ;i main( ){ int i,j; ...
A: In questions with many questions we must do first.
Q: Multicore architecture is a word used in the computer industry.
A: Introduction: A multicore architecture is one in which a single physical processor is combined with ...
Q: What are some of the most prevalent tools used in mobile app development?
A: Introduction: Surpasses Xamarin for developing native apps. Because it's a Microsoft product, you'll...
Q: What distinguishes EDGE from other training software when it comes to the development of projects is...
A: The Enhanced Dynamic Geo-Social Environment (EDGE) is a free virtual training platform that allows f...
Q: A c++ application that takes five user inputs and stores them in an array before passing them to a f...
A: C++ Code: #include<iostream>using namespace std;int main(){ int arr[100], tot, larg, i; ...
Q: process d an output enab-
A: As per protocol, allowed to answer first question and post the remaining in the next submission.
Q: Consider the following program. What does mooboo do? Provide an explanation with two example queries...
A: A A+B¯¯¯¯¯¯¯¯¯A+B¯ B AA C A.B¯¯¯¯¯¯¯A.B¯ D A+BA+B Answer B
Q: How to hack via the wps security?
A: WPS is one of the most common safety standards for a wireless home network that enables the users of...
Q: Create a list of the types of attacks that message authentication protects against.
A: Introduction: The different types of attacks addressed by message authentication are as follows,
Q: and 2AB-X 0 tmen the matrix Xis
A: We need to answer:
finding positive and negative on the given 2d array
Step by step
Solved in 4 steps with 2 images
- Example in Java Create an array, access, update and process its elementsInput array is :- array([[ 1960, 54211], [ 1961, 55438], [ 1962, 56225], [ 1963, 56695], [ 1964, 57032], [ 1965, 57360], [ 1966, 57715], [ 1967, 58055], [ 1968, 58386], [ 1969, 58726], [ 1970, 59063], [ 1971, 59440], [ 1972, 59840], [ 1973, 60243], [ 1974, 60528], [ 1975, 60657], [ 1976, 60586], [ 1977, 60366], [ 1978, 60103], [ 1979, 59980], [ 1980, 60096], [ 1981, 60567], [ 1982, 61345], [ 1983, 62201], [ 1984, 62836], [ 1985, 63026], [ 1986, 62644], [ 1987, 61833], [ 1988, 61079], [ 1989, 61032], [ 1990, 62149], [ 1991, 64622], [ 1992, 68235], [ 1993, 72504], [ 1994, 76700], [ 1995, 80324], [ 1996, 83200], [ 1997, 85451], [ 1998, 87277], [ 1999, 89005], [ 2000, 90853], [ 2001, 92898], [ 2002, 94992], [ 2003, 97017], [ 2004, 98737], [ 2005, 100031], [ 2006, 100832], [ 2007, 101220], [ 2008, 101353], [ 2009, 101453], [ 2010, 101669], [ 2011, 102053], [ 2012, 102577], [ 2013, 103187], [ 2014, 103795], [ 2015, 104341], [ 2016, 104822], [ 2017, 105264]]) Question 2 Now that…Create a java program to Display 10 elements using an array. The java program should be able to identify and show automatically the set of odd and even numbers based on the displayed elements.
- RadixSort sorts the following arrays: 1. 34, 9134, 20134, 29134, 4, 134 2. 4, 34, 134, 9134, 20134, 29134 3. 29134, 20134, 9134, 134, 34, 4User Interaction to Populate Array In this lab you will create an integer array and will populate it via user interaction. Type up the program, execute it and submit the results only. 1 import java.util.Scanner; // Import the Scanner class 2 3 public class ArrayEnterValues ( 59 public static void main(String[] args) { int[] myIntArr new int[5]; Scanner scan = new Scanner(System.in); for (int x = 0; x } } System.out.println("Enter the value for for index myIntArr[x] = scan.nextInt(); System.out.println("The values in my array are: "); for (int y = 0; y < 5; y++) ( System.out.println("Index: "+y+"\tValue: " + myIntArr[y]); }how to convert jagged array to normal 2d array and vice versa. (in java)
- Suppose the weekly hours for all employees are stored in a two-dimensional array. Each row records an employee's seven-day work hours with seven columns. For example, the following array stores the work hours for eight employees. Su MT W Th F Sa Su 52 2 Employeel 0 Employee2 1 Employee3 2 213 734 34 9 34 6 8 34 4 6 374 8 38 6 35 9 4 3. 4 4 32 3 4 87 34 3. 2 By Java Code Employees 7 Employee6 5 Employee7 6 Employees 7 6. 4 4 279 Write a program that Prompt the user to enter mumber of employees Prompt the user to enter the employees names and save their names in a one dimensional array. (Check for availability if name exist, no duplicate names) For each employee, enter the seven-day work hours and save them in a two dimensional array. Compute the total hours worked by each employee and save them in one dimensional array. the wages of employees as follows: up to 40 hours per week the hour price is 20 otherwise the overtime hour price is 1.2 regular hour price. Design a menu to the user so…Write a Java program that obtains products' numbers (array named products[]), and allows the user to perform array’s operations using the following methods: initializeArray() – to initialize the array’s elements printArray()- to print array’s elements searchArray()- to search and determine if a product exists in the array removeArray()- to remove an array element and display the new array The program also includes: One class named 4 One instance variable named size Your program should include the following code statements in the ArrayApp class:JAVA: Using a series of (step by step) diagrams illustrating what is happening in the array, and some words, explain in detail how the binary search would determine if 91 is present in the array below. (you can copy/paste this array into the answer window). 5 21 39 44 55 61 71 84 93
- Use java language Write a java program that will accept 10 decimal numbers and save it on array. After the input of 10 decimal numbers, compute and display the total and average of the array.Write a Java program that obtains products' numbers (array named products[]), and allows the user to perform array’s operations using the following methods: initializeArray() – to initialize the array’s elements printArray()- to print array’s elements searchArray()- to search and determine if a product exists in the array removeArray()- to remove an array element and display the new array The program also includes: One class named ArrayOperations One instance variable named size Your program should include the following code statements in the ArrayApp class:2. Write a java program that finds the largest and smallest element in 2 dimension array