• Define a two dimensional list with NxN elements. This list should be filled with random numbers between 100 and 200. • Write a function that takes a table as a parameter and prints list elements with table shape Write a function that takes a table as a parameter and return a list that holds diagonal (left-top corner to bottom-right) elements. Write a function that takes a table as a parameter and returns number of all odd numbers in the table
Q: .You are given an array of integers. The size (n) of the array is greater than or equal to 10. You…
A: The program is written in Python. Check the program screenshot for the correct indentation. Please…
Q: This program requires the student to create a programming loop. The program's loop with loop between…
A: #include<stdio.h> int main() { int no_of_weeks,i=1; /* variable declaration */ float…
Q: 1) Build a matrix called A consists of multidimensional arrays. This matrix contains three layers;…
A: Here is the matlab code of the above problem. See below steps.
Q: List and briefly define the parameters that define an SSL session state.
A:
Q: Task 1 Count the number of vowels in a phrase using recursion only. You can think of this problem as…
A: import java.util.Scanner; public class CountVowels { public static void main(String[]…
Q: CLASS NAME List the instance variables in the constructor. List the methods in the class. CLASS NAME…
A: As per the given question, we need to draw class diagram for the given class. Given Class name:…
Q: 10.5 LAB: Count probations (EO) Students are put on probation if their GPA is below 2.0. Complete…
A: The updated student class is given below:
Q: Discuss parallel approach for tree and graph traversal algorithm.
A:
Q: Consider a one-way authentication technique based on asymmetric encryption: A B: IDA B-A: E(PUR₂)…
A:
Q: Discuss parallel approach for tree and graph traversal algorithm.
A: Tree and Graph are non linear data structures and their traversal means visiting all the nodes in…
Q: Compare SDLC lean models with the traditional Waterfall SDLC model in terms of their basic…
A: The Software Development Life Cycle (SDLC) is a structured process that enables the production of…
Q: Why is it important to understand the updates and patches available for your operating system? What…
A: The program that manages all of a computer's other application programs after it is initially loaded…
Q: Chapter 13 – Mobile Devices in Computer Forensics Review Questions (4 points) What are the…
A: 1)Identity theft, stalking, fraud, pornography, illegal electronic surveillance, and theft of…
Q: Discuss class diagrams.
A:
Q: Write a program that includes in its MainClass the following methods: 1. A method called printArray…
A: The complete answer in Java is below:
Q: What are UML diagrams? Can describe several typical diagrams.
A: UML Standards for Unified Modeling Language which is used in software engineering it is a rich…
Q: Complete the following table by adding SNMPv2 requests and specify the name of the sender and…
A: Introduction to SNMPv2 It is defined as the protocol standards made several attempts to address the…
Q: Write c function to work as st without using string.h then te
A: Below is answer:
Q: Why does a PC need an IP, default gateway address and DNS server address in order to communicate…
A: According to the information given:- We have to define Why does a PC need an IP, default gateway…
Q: Find the Binary Representation for each of the following Decimal numbers 1. 10 2. 53 3. 85 4. 4.48
A: According to the information given:- We have to define binary representation for each of the…
Q: 1. What are the difference between mobile device forensics and computer forensics? (on your own…
A: 1) The purpose of computer and mobile forensics is to determine if a device was used for illegal…
Q: What is decision tree?
A:
Q: Is there a way that you can run the code? And paste the output. Because when ever I run it. It…
A: In this question we have to execute the program written in python for dice roll Let's run and…
Q: Explain the role of email in investigations. Describe client and server roles in email. Describe…
A: According to Bartleby Guidelines we need to answer only three sub questions so I have answered first…
Q: Title System Requirements 4. Hotel Management System You are asked to build an application used in…
A: The Code Given Below Is For The Customer Info Module package I3.UI; import…
Q: System Requirements Reservations and Guest module: ● ● The receptionist should be able to enter the…
A: The Code Given Below Is For The Customer Info Module package I3.UI; import…
Q: Q3:Explain different types cloud service development.
A:
Q: write operations of fuzzy set.
A:
Q: Discuss class diagrams.
A: i) The same UML diagrams can be used in different perspectives. In a conceptual perspective the…
Q: Question: a) list some of the uses of Microsoft Excel reqiured: please answer this question by…
A: What is excel: A piece of software developed by Microsoft that employs formulas and functions to…
Q: Write short note on Web based application.
A:
Q: a. Calculate the latency (in msec) required to send the 1500byte packet from Host A to Host B
A: Please check the solution below
Q: Write short note on Web based application.
A: The answer is given below step.
Q: What protocols comprise SSL?
A:
Q: Can leaq be used for arithmetic operations?
A: :: Solution:: However, leaq can also be used by a compiler to compute arithmetic operations…
Q: A. 0x2000 B. 0x2008 O C. 0x2010 D. 0x2018 O E. 0x2020 F. 0x2028 arte
A: Answer: E. 0*2020
Q: 1. Change the Salary column in the Employee table to reject nulls. 2. Change the length of the CITY…
A: 1. Change the Salary column in the Employee table to reject nulls. Query: ALTER TABLE Employee…
Q: What is the need of software Engineering.
A: The term software program engineering is the manufactured from words, software, and engineering.…
Q: combination of attributes, that could be used as a search key? Wh
A: The answer is
Q: Design CFG: Find context-free grammar that generate the following languages. (Note: there is NO…
A: A context free grammar is a forma grammar which is used to generate all the possible patterns of…
Q: b) Your lecturer is a funny guy; he wants you to find out from a sorted list that contains distinct…
A: Here is the c++ program of the above problem. See below steps.
Q: Discuss classical waterfall model to develop software.
A: Classical waterfall model The classical waterfall model is the fundamental software development life…
Q: What is fuzzy expert system.
A:
Q: Write a java program that prints a table showing how many times each digit appears in the number:…
A: PLS Find the attcahed code
Q: H G H I J K L M G 07 08 09 09 10 11 12 13 Z space T U V W X Y 19 20 21 22 23 24 25 26 00 A B B C D E…
A:
Q: In pyton Define a function drawCircle. This function should expect a Turtle object, the…
A: The complete answer in Python is below:
Q: How do graphic designers use the following in the working place 1. Writing text 2. Critical thinking…
A: The graphic designer uses the above following in the work place.
Q: C++ 10.17 Forms often allow a user to enter an integer. Write a program that takes in a string…
A: #include<iostream> #include<string>…
Q: What value is in x after the code above runs? A. 0x2000 OB. 0x2008 O C. 0x2010 D. 0x2018 O E. 0x2020…
A: y is a reference pointer which will point to x on using derefencing notation *. *y will refere to…
Q: What is the Height/Depth of the Tree ? A
A: Solution - In the given question, we have to find the Height/Depth of the given tree.
write a python code
Step by step
Solved in 3 steps with 2 images
- You are given the pointer to the head node of a linked list and an integer to add to the list. Create a new node with the given integer. Insert this node at the tail of the linked list and return the head node of the linked list formed after inserting this new node. The given head pointer may be null, meaning that the initial list is empty. Function Description Complete the insertNodeAtTail function in the editor below. insertNodeAtTail has the following parameters: SinglyLinkedListNode pointer head: a reference to the head of a list int data: the data value for the node to insert Returns SinglyLinkedListNode pointer: reference to the head of the modified linked list Input Format The first line contains an integer , the number of elements in the linked list.The next lines contain an integer each, the value that needs to be inserted at tail. Constraints Sample Input STDIN Function ----- -------- 5 size of linked list n = 5 141 linked list data values…Part I Implementation In this part you are asked to write functions with python . Define a two dimensional list with NxN elements. This list should be filled with random numbers between 100 and 200. . Write a function that takes a table as a parameter and prints list elements with table shape • Write a function that takes a table as a parameter and return a list that holds diagonal (left-top corner to bottom-right) elements. Write a function that takes a table as a parameter and returns number of all odd numbers in the table Note: You are not allowed to use Numpy package. Part II TestWrite the following function that partitions the list using the first element, called a pivot:def partition(lst): After the partition, the elements in the list are rearranged so that all the elements before the pivot are less than or equal to the pivot and the element after the pivot are greater than the pivot. The function also returns the index where the pivot is located in the new list. For example, suppose the list is [5, 2, 9, 3, 6, 8]. After the partition, the list becomes [3, 2, 5, 9, 6, 8]. Implement the function in a way that takes len(lst) comparisons. Write a test program that prompts the user to enter a list and displays the list after the partition.
- • Define a two dimensional list with NxN elements. This list should be filled with random numbers between 100 and 200. • Write a function that takes a table as a parameter and prints list elements with table shape • Write a function that takes a table as a parameter and return a list that holds diagonal (left-top corner to bottom-right) elements. • Write a function that takes a table as a parameter and returns number of all odd numbers in the table Note: You are not allowed to use Numpy package.The mapped list pattern Our second pattern is the mapped list pattern, described in video 4 3 mapped list pattern. Often we need to write a function that takes a list as a parameter and returns a new list in which each item in the original list is "mapped" to a new item in the result list. For example, the following function takes a list of numbers as a parameter and returns a list of all the numbers squared, e.g. squares ( [1, 3, 7]) returns [1, 9, 49]. def squares (nums): "Returns the squares of the given numbers""" result = [] for num in nums: result.append (num * num) return result Although this is just a special case of the accumulator pattern, it is so common that we give it its own name: the mapped list pattern. Consider the following function: def squares(nums): ""Returns the squares of the given numbers""" result = [] for num in nums: result.append (num * num) return result If the main program calls print(squares ( [5, -3, 2, 7]) what is the state table for the function…Replace XXX in the following function header for a doubly-linked list: ListInsertAfter(listName, currentNode, XXX) Group of answer choices headNode tailNode middleNode newNode
- python help, please show all steps and include comments Write a function largerLst() that takes a list of numbers (i.e., int or float values) as a parameter and returns a new list constructed out of it. The list returned has all the values in the parameter list that are larger than the element immediately to their right, that is, larger than their right neighbor. If the parameter list is empty or there are no values larger than their right neighbor, then the function returns an empty list. Note that the last element in the list will never be included in the list returned since it does not have a right neighbor. The function should not change the parameter list in any way. Note that a correct solution to this problem must use an indexed loop That is, one that makes a call to the range() function to generate indices into the list which are used to solve the problem (Review lecture notes 8-1). A solution that does not use an indexed loop will not be accepted. Note in particular that you…program7.pyThis assignment requires the main function and a custom value-returning function. The value-returning function takes a list of random integers as its only argument and returns a smaller list of only the elements that end with 7. This value-returning function must use a list comprehension to create this smaller list.In the main function, code these steps in this sequence: create an empty list that will the hold random integers. use a loop to add 50 random integers to the list. All integers should be between 200 and 250, inclusive. Duplicates are okay. sort the list in ascending order and then use another loop to display all 50 sorted integers on one line separated by spaces. print a slice showing list elements indexed 5 through 10, inclusive. print a second slice showing the final 5 elements in the sorted list. execute the custom function with the entire original list as its sole argument. report the number of elements in the new "sevens" list returned by the custom…In this part you are asked to write functions with python Define a two dimensional list with NxN elements. This list should be filled with random numbers between 100 and 200. .Write a function that takes a table as a parameter and prints list elements with table shape • Write a function that takes a table as a parameter and return a list that holds diagonal (left-top corner to bottom-right) elements. • Write a function that takes a table as a parameter and returns number of all odd numbers in the table Note: You are not allowed to use Numpy package.
- Exercise 6 Two words are anagrams if you can rearrange the letters from one to spell the other. Write a function called is_anagram that takes two strings and returns True if they are anagrams. Exercise 7 Write a function called has_duplicates that takes a list and returns True if there is any element that appears more than once. It should not modify the original list.Integer m and string my_name are read from input. Then, four strings are read from input and stored in the list names_data. Delete the first element in names_data, and then replace the element at index m with my_name.Two-dimensional list tictactoe represents a 3x3 tic-tac-toe game board read from input. List tictactoe contains three lists, each representing a row. Each list has three elements representing the three columns on the board. Each element in the tic-tac-toe game board is 'x', 'o', or '-'. If all the elements at column index 0 are 'o', output 'A win at column 0.' Otherwise, output 'No win at column 0.'