CSE 1310 – Spring 21Introduction to ProgrammingLab 4 Arrays and Functions
Assigned:Thursday, Apr. 15, 2020
Due:Thursday, Apr. 29, 11:59pm
Purpose:
This Lab 3 assignment is to have you practice writing your own code from the start. You will
· write code using reading input from a file
· write some functions and call them
· use arrays to save data
· use arrays to determine things about the data
Grading
The Lab assignment will be graded out of 100 points. There are multiple parts or tasks that make up each Lab. Each part may have multiple tasks or problems to complete. Each task has a point value associated with it.
Instructions for naming the files that you create for this lab assignment: [Same as Lab 1]
This assignment requires you to create a variety of files and folders: code files (your programs), edited files (your answer document), and a submission folder to store all the documents in that you must submit. Each of these files/folders will be named using a naming convention that makes it easy to distinguish which elements belong to which student. For each of these files/folders the instructions will indicate how to name the item. You will see names like XYZ1234Lab4answers, XYZ1234Lab1Part2, or XYZ1234Lab3.
In each of these names you see "XYZ1234". This is a placeholder for you to put in your initials and the last four digits of your ID number, i.e. "XYZ" gets replaced with your initials and "1234" gets replaced with the last four digits of your UTA ID number. So if I see an instruction that says " Create a NEW C application, i.e. a new C project, called XYZ1234Lab1Part2… " and my initials are JCMT and the last four digits of my ID are 1234, then the file that I should create would be named JCMT1234Lab1Part2. Note that you can use however many initials you have to replace the "XYZ". I use 4 initials so that is what I put; if you use two initials "MW", then replace "XYZ" with "MW". You must use exactly 4 digits from the end of your ID to replace 1234.
Don't change any other part of the given file name. If it says XYZ1234Lab1Part2 and you are ABC and 5678 then your file name must be ABC5678Lab1Part2. It cannot be ABC5678Part2 or ABC567812 or ABC5678LabOnePartTwo etc.
Naming summary: Use your initials and your last 4 digits of ID in place of "XYZ1234" in the given file names. Keep all the rest of the name as defined.
Instructions about the Answers document required for the Lab: [Same as Lab 1]
For every lab assignment you need to create ONE Answers file. In this Answers file you will put in the answers any questions that are asked, you will show the output of code that you write and you will reference any code files that you create for a given question. All answers/outputs etc. go into the same answers document.
· Your answers document needs to be named with your initials and the last four digits of your ID number and then Lab#Answers. So if my initials are JCMT and the last four digits of my ID are 1234, then th ...
The Lab assignment will be graded out of 100 points. There are .docxjmindy
The Lab assignment will be graded out of 100 points. There are multiple parts or tasks that make up each Lab.
This document can be downloaded here :
Lab4CFall20v1.docx
The code you need to start with :
Lab4Part1.c
The data file you need :
Lab4giftList.txt
(Note that this file name doesn't match the code so you'll need to adjust that.)
Some tasks ask you to write code, and specify what name to use for the file in NetBeans. You need to use exactly the name that is given (do not change the case, or make any other modification). Remember, the name of the main class must match the filename.
There are further instructions at the bottom (after the questions) about how to save the file from NetBeans in order to be able to turn it in.
For every lab assignment you need to create an answers file. In this answers file you will put in answer any questions that are asked, you will show the output of code that you write and you will reference any code files that you create for a given question. See below for more details about what goes in the answers file.
Your answers document needs to be named with your initials and the last four digits of your ID number and then Lab#answers. So if my initials are JCMT and the last four digits of my ID are 1234, then the answers file for my Lab 4 would be
JCMT1234Lab3answers
.
The ONLY acceptable file formats are Word document, OpenOffice document, and PDF.
Put your last name, first name and UTA ID in the file on the first line.
[-5 deduction if not**]
Label the answers for each question with the number/letter of the question.
Separate each answer from the next answer by at least two blank lines
.
[-5 deduction if not**]
Include EVERY question number/letter combination from the assignment in your answers document. If the question is a coding question telling you to save a file, for example some question numbered 17.b), then in your answers document you should have a line like the following for question 17.b):
17.b) Please see file Lab1Part3.c for this question.”
Put all your question answers the answer document.
If the lab question asks you to show the output of a doing some particular thing with the code, then you must also put a screenshot of the output in the answer document. For output that takes up more than one screen, make multiple pictures so that every screen is recorded. If you do not include the screenshots in your answer document, then the questions that should have had screenshots will be considered “Not answered” and will be awarded ZERO 0 points.
Each task below will instruct you where to put your answers. If the task says to “Save your program as file
XYZ1234Lab1Task1.c
” then this .c file should be turned in as part of the assignment along with the answers file.
Every lab assignment has a given due date. No late labs will be accepted. (Five minutes late is still late.) Lab assignments will be posted on Canvas. If you are unable to turn in your .
Cmps 260, fall 2021 programming assignment #3 (125 points)mehek4
Here are the corrections to the figure citation and in-text citations:
Figure 1. Action Research Plan Cycle. Reprinted from An Action research approach to curriculum development by Authors P. Riding, S. Fowell, & P. Levy (1995). Retrieved from Information Research, 1(1) at: http://InformationR.net/ir/1-1/paper2.html
(Ariyani, Hanantjo, & Purnama, 2015)
(Shaw et al., 2012)
Methodology
The purpose of this research revolves around the exploration of some of the factors that may act as barriers or facilitators to web development in commerce as well as comprehend
Article link httpiveybusinessjournal.compublicationmanaging-.docxfredharris32
Article link: http://iveybusinessjournal.com/publication/managing-global-risk-to-seize-competitive-advantage/
Requirements: Write one summary and study note both no longer than one pages should include all point of article. Then do a PPT and write a presenting paper only for 5 minutes.
Groups of students will create and offer two MS PowerPoint presentation summarizing the main points of one of the readings for this course along with a one page handout for the students in the class. The aim of the presentations and the handouts is to provide the audience with the main ideas of the article and study notes. Groups will bring to class enough copies of the handout for each student in the class. The handout should list the name of the author, the title of the article, the title of the journal, and the publication date and page numbers along with a summary of its main points. Please do not exceed one page for this material.
import java.io.BufferedReader;
import java.io.BufferedWriter;
import java.io.FileReader;
import java.io.FileWriter;
import java.io.IOException;
import java.io.PrintWriter;
import java.util.StringTokenizer;
/**
* Read a .dat file and reverse it.
*/
public class Reverse {
public static void main(String[]args) {
if (args.length != 3) {
System.err.println(" Incorrect number of arguments");
System.err.println(" Usage: ");
System.err.
println("\tjava Reverse <stack type> <input file> <output file>");
System.exit(1);
}
boolean useList = true;
if (args[0].compareTo("list")==0)
useList = true;
else if (args[0].compareTo("array")==0)
useList = false;
else {
System.err.println("\tSaw "+args[0]+" instead of list or array as first argument");
System.exit(1);
}
try {
//
// Set up the input file to read, and the output file to write to
//
BufferedReader fileIn =
new BufferedReader(new FileReader(args[1]));
PrintWriter fileOut =
new PrintWriter(new
BufferedWriter(new FileWriter(args[2])));
//
// Read the first line of the .dat file to get sample rate.
// We want to store the sample rate value in a variable,
// but we can ignore the "; Sample Rate" part of the line.
// Step through the first line one token (word) at a time
// using the StringTokenizer. The fourth token is the one
// we want (the sample rate).
//
StringTokenizer str;
String oneLine;
int sampleRate;
String strJunk;
oneLine = fileIn.readLine();
str = new StringTokenizer(oneLine);
strJunk = str.nextToken(); // Read in semicolon
strJunk = str.nextToken(); // Read in "Sample"
strJunk = str.nextToken(); // Read in "Rate"
// ...
hw2.docxHomework #2Please complete the homework problems on th.docxwilcockiris
hw2.docxHomework #2
Please complete the homework problems on the following page using a separate piece of paper. Note that this is an individual assignment and all work must be your own. Be sure to show your work when appropriate. This assignment is due in lab
1. [3] Remove 5 from the following AVL tree; draw the results:
2. [3] Insert the value "8" into the following AVL tree; draw the result:
3. Given the following AVL tree:
A. [3] Add 45 to the tree.
B. [3] Ignoring all previous tasks, add values 9 and 8 to the tree.
C. [3] Ignoring all previous tasks, remove values 10 and 30 from the tree.
D. [3] Ignoring all previous tasks, remove 80 and 100 from the tree.
4. Binary Heaps (i.e. Priority Queues) Starting with an empty binary min heap, show the following. Be sure to clearly label each diagram.
A. [3] The final state of the heap, in tree form, after adding in the values: 5, 4, 3, 6, 7, 8, 10, 2, 9, 1
B. [3] The state of the heap, in tree form, after two Dequeue() operations
C. [2] The final, array-based version of the heap
0
1
2
3
4
5
6
7
8
9
results.csvJob NameStarting TickEnding TickDurationJ2220J11109J44128J66148J1010144J99178J881911J772013J552520J333734
PA4.docxProgramming Assignment #4
Your organization has purchased a new parallel computer (or "cluster") which has several processors. Your task is to design and implement a simple shortest-job-first scheduler that allows multiple users to access the cluster at the same time, as per the following specification:
The scheduler performs all required functions at regular intervals, often called "ticks." During each tick, the scheduler must take into consideration several pieces of information:
1. Are there jobs in our input file that contains a list of jobs to be run? If so, add that job to our list of current jobs. Note that our jobs file contains one job per line in the following format: "<JOB_NAME> <CPUS_REQUIRED> <DURATION>". Only one job may be added to the jobs queue during any given tick. If a job has a name of "NULL," skip that job for the current tick (i.e. no jobs will be added during this tick). If a job requires more CPUs than the cluster contains, you should output an error and terminate execution of the program.
2. Are there jobs in the jobs queue? If so, find the job with the shortest duration. Are there enough CPU resources for this job to run? If so, begin execution (i.e. add to the active jobs queue). If, after adding the previous job, are there enough resources to run the next job in the queuejob? If so, go back to the beginning of step #2. Stop adding to the list of active jobs when there are not enough CPU resources available for the job to execute. Try again in the future.
3. For each executing job (note that there may be multiple concurrent jobs), perform one tick's worth of work. After, check to see if the job is done executing. If complete, remove from the active jobs queue and allocate the job's CPU resources back into.
FOR MORE CLASSES VISIT
tutorialoutletdotcom
NameFirstNamePhoneNumberTranslator.java
Coin.java
LastNameFirstNameCoinDriver.java
ModifiedCoin.java Note 1: Unless otherwise mentioned, you are asked to upload ONLY your java source files through
blackboard. Email submission is not accepted, because of confusion in grading.
This document provides instructions for completing Project 2 of the CS348 database course. Students are asked to:
1. Create five Oracle database tables based on a given schema using the CREATE statement.
2. Populate the tables with sample data using a provided data.sql file.
3. Write seven SQL queries to answer questions about the data, such as finding the faculty teaching the most classes or students enrolled in the most classes taught by a specific department.
The program reads data from two files, itemsList-0x.txt and .docxoscars29
The program reads data from two files,
itemsList-0x.txt
and
inventoryList-0x.txt
. File extensions on Linux may be arbitrary–i.e., these files could have been named with
.dat
as the extensions.
The first file,
itemsList-0x.txt
, lists all possible items. Each line represents one item in the form
id name
.
Example 1: Sample itemsList-0x.txt
0 Air 1 HP Potion 2 MP Potion 5 Iron Ore 3 Bow Tie 4 Dirt 6 Diamond Ore 7 Iron Ingot 8 Diamond 9 Diamond Block
The second file,
inventoryList-0x.txt
, lists each individual inventory–or storage chest–followed by a list of items.
Example 2: Sample inventoryList-0x.txt
# 5
- 1 10 - 2 5 - 3 2 # 6
- 4 3 - 5 27 - 6 44 - 7 55 - 8 1 - 9 4 - 4 3 # 2
- 2 5 - 9 4 - 8 1 - 5 2 - 10 5
Each line preceded by
#
denotes the start of a new inventory. Each line preceded by
-
denotes an item. The program creates a new inventory each time a
#
is encountered.
When a
-
is encountered, a stack of items, ItemStack, is created. The
ItemStack
is placed in the
Inventory
based on the following rules:
If the Inventory is empty, store the ItemStack, and
return true
.
If the Inventory is not empty, examine the Inventory.
If a matching ItemStack is found, merge the two ItemStacks and
return true
.
If no matching ItemStack is found, store the new ItemStack and
return true
.
If the Inventory is full,
return false
.
Through the magic of abstraction, this is not one function, but four (4) functions in total. Yes, it does seem unnecessary at first. However, each function does one thing and only one thing. This is an exercise in understanding the thought process behind abstraction, interfaces, and the
S
/
O
in
S.O.L.I.D
(with some C++ code) in a multi-ADT program.
Most of your time will be spent on understanding the abstractions (and interfaces) as opposed to spamming cobblestone blocks… I mean C++ code.
3.2 Output
The output consists of three reports written to standard output, one after the other.
A report listing items that were stored or discarded.
A report listing all valid items.
Finally, a detailed report is printed. listing data for each inventory:
Maximum Capacity–i.e., total slots.
Utilized Capacity–i.e., occupied slots
Listing of all items.
If the program is run with the provided input files, the following output should be generated…
Example 3: Sample Output
Processing Log: Stored (10) HP Potion Stored ( 5) MP Potion Stored ( 2) Bow Tie Stored ( 3) Dirt Stored (27) Iron Ore Stored (44) Diamond Ore Stored (55) Iron Ingot Stored ( 1) Diamond Stored ( 4) Diamond Block Stored ( 3) Dirt Stored ( 5) MP Potion Stored ( 4) Diamond Block Discarded ( 1) Diamond Discarded ( 2) Iron Ore Item List: 0 Air 1 HP Potion 2 MP Potion 3 Bow Tie 4 Dirt 5 Iron Ore 6 Diamond Ore 7 Iron Ingot 8 Diamond 9 Diamond Block Storage Summary: -Used 3 of 5 slots (10) HP Potion ( 5) MP Potion ( 2) Bow Tie -Used 6 of 6 slots ( 6) Dirt.
COMP 2213X2 Assignment #2 Parts A and BDue February 3 in cla.docxdonnajames55
COMP 2213X2 Assignment #2 Parts A and B
Due February 3 in class
PLEASE HAND IN PARTS A AND B SEPARATELY!!!!
For “written” questions, please type your answers, use your very best English, and carefully
consider the material from the chapters. I am usually only looking for a few sentences for each
question, not an essay that goes on for pages. So choose your words carefully and thoughtfully.
PART A
[1] Does a computer need data registers (like D0–D7 in an M68K)? Defend your answer!
[2] Textbook question 5.35. If your student number is even, do parts (a), (c), (e) and (g). Otherwise do
parts (b), (d), (f) and (h). Note that (b) should read “[[[4]]]”, (c) should read “[[[0]]]” and
(h) should start with “[0]”.
[3] Explain why the following assembly language and RTL constructs are incorrect.
a. MOVE D3,#4
b. MOVE [D3],D2
c. MOVE (D3),D2
d. [D3] A0 + 3
e. [D3] #3
f. 3 [D3]
[4] Create a simple M68K program called ADDER. Your program should add together the numbers:
6, 4, 12, 16, 17, and 50. The program should leave the answer in register D0 when it terminates.
The program is to be assembled with the M68K cross-assembler and then run on the M68K simu-
lator. You can either install the cross-assembler and simulator given with the textbook (windows)
or you can use the Linux one available on the course web site. Doing a trace (to hand in) with the
windows version is much more painful than the Linux version, so make your choice carefully (and
you have to figure out the windows one without my help).
To use the Linux assembler (“68kasm”) and simulator (“bsvc”), follow the instructions in my
mail message of January 26, if you have not already done so.
IMPORTANT NOTE: if you are using the Linux simulator, the instructions for creating a program
are slightly different than those in the book. You should have the following at the start of each
program:
ORG $0
DC.L $8000 This is the stack pointer value after a "reset"
DC.L START This is the first instruction to execute
You can then follow that with something like
1
ORG $1000
START MOVE ...
You should still have a STOP instruction and END assembler directive, as described in the book,
but also use a BREAK instruction right before your STOP instruction.
Create your program (ADDER.s) in your (for example) comp2213/bsvc-master directory using
your favourite text editor and assemble it with the command 68kasm -l ADDER.s. If you had no
assembly errors you should now have a file called ADDER.h68 (which is your executable program)
and ADDER.lis (your program listing). Then start up the simulator by typing bsvc. Select
File/Open Setup, drill down to samples/m68000, select serial.setup and click Open; a
new window should pop up on your screen. Now choose File/Load Program, come back up to
your bsvc-master directory, and open your ADDER.h68 program. Now click the GUI’s Reset
button and then the Run button. (Alternatively, instead of Run click Single Step and watch the
result of each instruction..
The Lab assignment will be graded out of 100 points. There are .docxjmindy
The Lab assignment will be graded out of 100 points. There are multiple parts or tasks that make up each Lab.
This document can be downloaded here :
Lab4CFall20v1.docx
The code you need to start with :
Lab4Part1.c
The data file you need :
Lab4giftList.txt
(Note that this file name doesn't match the code so you'll need to adjust that.)
Some tasks ask you to write code, and specify what name to use for the file in NetBeans. You need to use exactly the name that is given (do not change the case, or make any other modification). Remember, the name of the main class must match the filename.
There are further instructions at the bottom (after the questions) about how to save the file from NetBeans in order to be able to turn it in.
For every lab assignment you need to create an answers file. In this answers file you will put in answer any questions that are asked, you will show the output of code that you write and you will reference any code files that you create for a given question. See below for more details about what goes in the answers file.
Your answers document needs to be named with your initials and the last four digits of your ID number and then Lab#answers. So if my initials are JCMT and the last four digits of my ID are 1234, then the answers file for my Lab 4 would be
JCMT1234Lab3answers
.
The ONLY acceptable file formats are Word document, OpenOffice document, and PDF.
Put your last name, first name and UTA ID in the file on the first line.
[-5 deduction if not**]
Label the answers for each question with the number/letter of the question.
Separate each answer from the next answer by at least two blank lines
.
[-5 deduction if not**]
Include EVERY question number/letter combination from the assignment in your answers document. If the question is a coding question telling you to save a file, for example some question numbered 17.b), then in your answers document you should have a line like the following for question 17.b):
17.b) Please see file Lab1Part3.c for this question.”
Put all your question answers the answer document.
If the lab question asks you to show the output of a doing some particular thing with the code, then you must also put a screenshot of the output in the answer document. For output that takes up more than one screen, make multiple pictures so that every screen is recorded. If you do not include the screenshots in your answer document, then the questions that should have had screenshots will be considered “Not answered” and will be awarded ZERO 0 points.
Each task below will instruct you where to put your answers. If the task says to “Save your program as file
XYZ1234Lab1Task1.c
” then this .c file should be turned in as part of the assignment along with the answers file.
Every lab assignment has a given due date. No late labs will be accepted. (Five minutes late is still late.) Lab assignments will be posted on Canvas. If you are unable to turn in your .
Cmps 260, fall 2021 programming assignment #3 (125 points)mehek4
Here are the corrections to the figure citation and in-text citations:
Figure 1. Action Research Plan Cycle. Reprinted from An Action research approach to curriculum development by Authors P. Riding, S. Fowell, & P. Levy (1995). Retrieved from Information Research, 1(1) at: http://InformationR.net/ir/1-1/paper2.html
(Ariyani, Hanantjo, & Purnama, 2015)
(Shaw et al., 2012)
Methodology
The purpose of this research revolves around the exploration of some of the factors that may act as barriers or facilitators to web development in commerce as well as comprehend
Article link httpiveybusinessjournal.compublicationmanaging-.docxfredharris32
Article link: http://iveybusinessjournal.com/publication/managing-global-risk-to-seize-competitive-advantage/
Requirements: Write one summary and study note both no longer than one pages should include all point of article. Then do a PPT and write a presenting paper only for 5 minutes.
Groups of students will create and offer two MS PowerPoint presentation summarizing the main points of one of the readings for this course along with a one page handout for the students in the class. The aim of the presentations and the handouts is to provide the audience with the main ideas of the article and study notes. Groups will bring to class enough copies of the handout for each student in the class. The handout should list the name of the author, the title of the article, the title of the journal, and the publication date and page numbers along with a summary of its main points. Please do not exceed one page for this material.
import java.io.BufferedReader;
import java.io.BufferedWriter;
import java.io.FileReader;
import java.io.FileWriter;
import java.io.IOException;
import java.io.PrintWriter;
import java.util.StringTokenizer;
/**
* Read a .dat file and reverse it.
*/
public class Reverse {
public static void main(String[]args) {
if (args.length != 3) {
System.err.println(" Incorrect number of arguments");
System.err.println(" Usage: ");
System.err.
println("\tjava Reverse <stack type> <input file> <output file>");
System.exit(1);
}
boolean useList = true;
if (args[0].compareTo("list")==0)
useList = true;
else if (args[0].compareTo("array")==0)
useList = false;
else {
System.err.println("\tSaw "+args[0]+" instead of list or array as first argument");
System.exit(1);
}
try {
//
// Set up the input file to read, and the output file to write to
//
BufferedReader fileIn =
new BufferedReader(new FileReader(args[1]));
PrintWriter fileOut =
new PrintWriter(new
BufferedWriter(new FileWriter(args[2])));
//
// Read the first line of the .dat file to get sample rate.
// We want to store the sample rate value in a variable,
// but we can ignore the "; Sample Rate" part of the line.
// Step through the first line one token (word) at a time
// using the StringTokenizer. The fourth token is the one
// we want (the sample rate).
//
StringTokenizer str;
String oneLine;
int sampleRate;
String strJunk;
oneLine = fileIn.readLine();
str = new StringTokenizer(oneLine);
strJunk = str.nextToken(); // Read in semicolon
strJunk = str.nextToken(); // Read in "Sample"
strJunk = str.nextToken(); // Read in "Rate"
// ...
hw2.docxHomework #2Please complete the homework problems on th.docxwilcockiris
hw2.docxHomework #2
Please complete the homework problems on the following page using a separate piece of paper. Note that this is an individual assignment and all work must be your own. Be sure to show your work when appropriate. This assignment is due in lab
1. [3] Remove 5 from the following AVL tree; draw the results:
2. [3] Insert the value "8" into the following AVL tree; draw the result:
3. Given the following AVL tree:
A. [3] Add 45 to the tree.
B. [3] Ignoring all previous tasks, add values 9 and 8 to the tree.
C. [3] Ignoring all previous tasks, remove values 10 and 30 from the tree.
D. [3] Ignoring all previous tasks, remove 80 and 100 from the tree.
4. Binary Heaps (i.e. Priority Queues) Starting with an empty binary min heap, show the following. Be sure to clearly label each diagram.
A. [3] The final state of the heap, in tree form, after adding in the values: 5, 4, 3, 6, 7, 8, 10, 2, 9, 1
B. [3] The state of the heap, in tree form, after two Dequeue() operations
C. [2] The final, array-based version of the heap
0
1
2
3
4
5
6
7
8
9
results.csvJob NameStarting TickEnding TickDurationJ2220J11109J44128J66148J1010144J99178J881911J772013J552520J333734
PA4.docxProgramming Assignment #4
Your organization has purchased a new parallel computer (or "cluster") which has several processors. Your task is to design and implement a simple shortest-job-first scheduler that allows multiple users to access the cluster at the same time, as per the following specification:
The scheduler performs all required functions at regular intervals, often called "ticks." During each tick, the scheduler must take into consideration several pieces of information:
1. Are there jobs in our input file that contains a list of jobs to be run? If so, add that job to our list of current jobs. Note that our jobs file contains one job per line in the following format: "<JOB_NAME> <CPUS_REQUIRED> <DURATION>". Only one job may be added to the jobs queue during any given tick. If a job has a name of "NULL," skip that job for the current tick (i.e. no jobs will be added during this tick). If a job requires more CPUs than the cluster contains, you should output an error and terminate execution of the program.
2. Are there jobs in the jobs queue? If so, find the job with the shortest duration. Are there enough CPU resources for this job to run? If so, begin execution (i.e. add to the active jobs queue). If, after adding the previous job, are there enough resources to run the next job in the queuejob? If so, go back to the beginning of step #2. Stop adding to the list of active jobs when there are not enough CPU resources available for the job to execute. Try again in the future.
3. For each executing job (note that there may be multiple concurrent jobs), perform one tick's worth of work. After, check to see if the job is done executing. If complete, remove from the active jobs queue and allocate the job's CPU resources back into.
FOR MORE CLASSES VISIT
tutorialoutletdotcom
NameFirstNamePhoneNumberTranslator.java
Coin.java
LastNameFirstNameCoinDriver.java
ModifiedCoin.java Note 1: Unless otherwise mentioned, you are asked to upload ONLY your java source files through
blackboard. Email submission is not accepted, because of confusion in grading.
This document provides instructions for completing Project 2 of the CS348 database course. Students are asked to:
1. Create five Oracle database tables based on a given schema using the CREATE statement.
2. Populate the tables with sample data using a provided data.sql file.
3. Write seven SQL queries to answer questions about the data, such as finding the faculty teaching the most classes or students enrolled in the most classes taught by a specific department.
The program reads data from two files, itemsList-0x.txt and .docxoscars29
The program reads data from two files,
itemsList-0x.txt
and
inventoryList-0x.txt
. File extensions on Linux may be arbitrary–i.e., these files could have been named with
.dat
as the extensions.
The first file,
itemsList-0x.txt
, lists all possible items. Each line represents one item in the form
id name
.
Example 1: Sample itemsList-0x.txt
0 Air 1 HP Potion 2 MP Potion 5 Iron Ore 3 Bow Tie 4 Dirt 6 Diamond Ore 7 Iron Ingot 8 Diamond 9 Diamond Block
The second file,
inventoryList-0x.txt
, lists each individual inventory–or storage chest–followed by a list of items.
Example 2: Sample inventoryList-0x.txt
# 5
- 1 10 - 2 5 - 3 2 # 6
- 4 3 - 5 27 - 6 44 - 7 55 - 8 1 - 9 4 - 4 3 # 2
- 2 5 - 9 4 - 8 1 - 5 2 - 10 5
Each line preceded by
#
denotes the start of a new inventory. Each line preceded by
-
denotes an item. The program creates a new inventory each time a
#
is encountered.
When a
-
is encountered, a stack of items, ItemStack, is created. The
ItemStack
is placed in the
Inventory
based on the following rules:
If the Inventory is empty, store the ItemStack, and
return true
.
If the Inventory is not empty, examine the Inventory.
If a matching ItemStack is found, merge the two ItemStacks and
return true
.
If no matching ItemStack is found, store the new ItemStack and
return true
.
If the Inventory is full,
return false
.
Through the magic of abstraction, this is not one function, but four (4) functions in total. Yes, it does seem unnecessary at first. However, each function does one thing and only one thing. This is an exercise in understanding the thought process behind abstraction, interfaces, and the
S
/
O
in
S.O.L.I.D
(with some C++ code) in a multi-ADT program.
Most of your time will be spent on understanding the abstractions (and interfaces) as opposed to spamming cobblestone blocks… I mean C++ code.
3.2 Output
The output consists of three reports written to standard output, one after the other.
A report listing items that were stored or discarded.
A report listing all valid items.
Finally, a detailed report is printed. listing data for each inventory:
Maximum Capacity–i.e., total slots.
Utilized Capacity–i.e., occupied slots
Listing of all items.
If the program is run with the provided input files, the following output should be generated…
Example 3: Sample Output
Processing Log: Stored (10) HP Potion Stored ( 5) MP Potion Stored ( 2) Bow Tie Stored ( 3) Dirt Stored (27) Iron Ore Stored (44) Diamond Ore Stored (55) Iron Ingot Stored ( 1) Diamond Stored ( 4) Diamond Block Stored ( 3) Dirt Stored ( 5) MP Potion Stored ( 4) Diamond Block Discarded ( 1) Diamond Discarded ( 2) Iron Ore Item List: 0 Air 1 HP Potion 2 MP Potion 3 Bow Tie 4 Dirt 5 Iron Ore 6 Diamond Ore 7 Iron Ingot 8 Diamond 9 Diamond Block Storage Summary: -Used 3 of 5 slots (10) HP Potion ( 5) MP Potion ( 2) Bow Tie -Used 6 of 6 slots ( 6) Dirt.
COMP 2213X2 Assignment #2 Parts A and BDue February 3 in cla.docxdonnajames55
COMP 2213X2 Assignment #2 Parts A and B
Due February 3 in class
PLEASE HAND IN PARTS A AND B SEPARATELY!!!!
For “written” questions, please type your answers, use your very best English, and carefully
consider the material from the chapters. I am usually only looking for a few sentences for each
question, not an essay that goes on for pages. So choose your words carefully and thoughtfully.
PART A
[1] Does a computer need data registers (like D0–D7 in an M68K)? Defend your answer!
[2] Textbook question 5.35. If your student number is even, do parts (a), (c), (e) and (g). Otherwise do
parts (b), (d), (f) and (h). Note that (b) should read “[[[4]]]”, (c) should read “[[[0]]]” and
(h) should start with “[0]”.
[3] Explain why the following assembly language and RTL constructs are incorrect.
a. MOVE D3,#4
b. MOVE [D3],D2
c. MOVE (D3),D2
d. [D3] A0 + 3
e. [D3] #3
f. 3 [D3]
[4] Create a simple M68K program called ADDER. Your program should add together the numbers:
6, 4, 12, 16, 17, and 50. The program should leave the answer in register D0 when it terminates.
The program is to be assembled with the M68K cross-assembler and then run on the M68K simu-
lator. You can either install the cross-assembler and simulator given with the textbook (windows)
or you can use the Linux one available on the course web site. Doing a trace (to hand in) with the
windows version is much more painful than the Linux version, so make your choice carefully (and
you have to figure out the windows one without my help).
To use the Linux assembler (“68kasm”) and simulator (“bsvc”), follow the instructions in my
mail message of January 26, if you have not already done so.
IMPORTANT NOTE: if you are using the Linux simulator, the instructions for creating a program
are slightly different than those in the book. You should have the following at the start of each
program:
ORG $0
DC.L $8000 This is the stack pointer value after a "reset"
DC.L START This is the first instruction to execute
You can then follow that with something like
1
ORG $1000
START MOVE ...
You should still have a STOP instruction and END assembler directive, as described in the book,
but also use a BREAK instruction right before your STOP instruction.
Create your program (ADDER.s) in your (for example) comp2213/bsvc-master directory using
your favourite text editor and assemble it with the command 68kasm -l ADDER.s. If you had no
assembly errors you should now have a file called ADDER.h68 (which is your executable program)
and ADDER.lis (your program listing). Then start up the simulator by typing bsvc. Select
File/Open Setup, drill down to samples/m68000, select serial.setup and click Open; a
new window should pop up on your screen. Now choose File/Load Program, come back up to
your bsvc-master directory, and open your ADDER.h68 program. Now click the GUI’s Reset
button and then the Run button. (Alternatively, instead of Run click Single Step and watch the
result of each instruction..
CSE 110 - ASSIGNMENT # 4 – Fall 2015 Due Tuesday Octobe.docxfaithxdunce63732
CSE 110 - ASSIGNMENT # 4 – Fall 2015
Due: Tuesday October 6 by 10:00AM Maximum Points: 20 pts
Topics
• Loops (Chapter 4)
Note: Your programming assignments require individual work and effort to be of any
benefit. Every student must work independently on his or her assignments. This means that every
student must ensure that neither a soft copy nor a hard copy of their work gets into the hands of
another student. Sharing your assignments with others in any way is NOT permitted.
Violations of the University Academic Integrity policy will not be ignored. The university academic
integrity policy is found at http://www.asu.edu/studentaffairs/studentlife/judicial/academic_integrity.htm
Use the following Guidelines:
• Give identifiers semantic meaning and make them easy to read (examples numStudents,
grossPay, etc).
• Keep identifiers to a reasonably short length.
• User upper case for constants. Use title case (first letter is upper case) for classes. Use lower
case with uppercase word separators for all other identifiers (variables, methods, objects).
• Use tabs or spaces to indent code within blocks (code surrounded by braces). This includes
classes, methods, and code associated with ifs, switches and loops. Be consistent with the
number of spaces or tabs that you use to indent.
• Use white space to make your program more readable.
• Reasonably good amount of comments should be added in your program so that it is easy
for other people to understand it. Please see the comment style in the textbook.
Important Note:
All submitted assignments must begin with the descriptive comment block. To avoid losing trivial
points, make sure this comment header is included in every assignment you submit, and that it is
updated accordingly from assignment to assignment. (If not, -1 Pt)
//***********************************************************
// Name: your name
// Title: title of the source file
// Author: (if not you, put the name of author here)
// Description: Write the description in your words.
// Time spent: how long it took you to complete the assignment
// Date: the date you programmed
//**********************************************************
http://www.asu.edu/studentaffairs/studentlife/judicial/academic_integrity.htm
http://www.eas.asu.edu/%7Ecsedept/
Part 1: Writing Exercise: (5 pts)
The following are the exercises about the loops in Java. Write the answers in a comment block
before the code of Part2.
a. What are the three required expressions of a for-loop? (1 pts)
b. Consider the following code. This code was written to generate the output as shown in
Output 2. However, there is an error in this code. Correct the code so that it is able to
generate the desired output. (2 pts)
int count = 0;
while (count < 10)
{
System.out.println("count:" + count);
}
Output 2
count:0
count:1
count:2
count:3
.
In this lab you will learn how to use the Java Software Development Kit (SDK) with the Eclipse programming tool. In addition, you will create three simple Java programs.
This document provides instructions for completing a lab assignment involving the creation of three Java programs using Eclipse. The programs are: 1) ShowEscapeSequences, which displays text on separate lines using escape sequences; 2) Circle, which calculates and displays the diameter, circumference, and area of a circle given the radius; and 3) PracticeArithmeticOperators, which performs arithmetic operations on two user-input numbers and displays the results in a table. Students are instructed to include specific comments and output in their programs and submit source code files in a zip folder.
Cis 1403 lab1- the process of programmingHamad Odhabi
This lab aims to develop students knowledge and skills needed to create a simple programming code. It covers the process of developing computer programs starting from a simple analysis of the problem, identifying outputs, inputs, and design process/algorithm, convert algorithm to code, testing, and documentation. The student will be introduced to the Java program structure, numerical variable and high-level introduction to data types. The lab does not go into depth explaining the data types and memory storage. These will be discussed in the upcoming labs. Also, the student will be introduced to the REPL cloud environment that will be used to create a simple application.
The document provides instructions for an assignment to design a program that calculates the sum, smallest value, and largest value of a list of numbers entered by a user. The program should prompt the user to enter a number or end the program. It will continuously update the sum, minimum, and maximum. The assignment requires an analysis of the problem, program design including flowcharts and pseudocode, and sample test data.
This document provides instructions for completing the first lab assignment in CIS/355. Students will create three Java programs - ShowEscapeSequences, Circle, and PracticeArithmeticOperators. Each program must include comments with the program name, student name, and description. Students should save the Java source files, class files, and program outputs in a Word document and submit all files in a single zip folder with a specific naming convention. The document provides details on what each program should display or calculate, as well as grading rubrics for each program.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Question 1 briefly respond to all the following questions. make YASHU40
This document contains instructions and questions for a computer science assignment on functions in Python. It asks the student to write functions to find the maximum of three values, convert temperatures between Celsius and Fahrenheit, calculate factorials recursively, and more. It provides examples and asks the student to explain their work, show code/screenshots, and submit all work in a zip file.
This document describes Lab 4, which involves creating and traversing a binary tree to sort student data in C or C++. Students will write functions to insert nodes into the binary tree based on student IDs and print out the sorted tree. The lab instructions specify creating a makefile, testing the code with sample input, running it on a provided test file, and submitting the required files in a tarball.
<a href="https://www.a1autorecycling.com.au/car-removal-gold-coast/">Car removal gold coast</a> is the best in the cash for cars removal services provider in brisbane.
Bt0065, c programming and data structuressmumbahelp
This document provides information about a fully solved assignment for the subject of C Programming and Data Structures for the first semester of a B.Sc IT program. It includes 6 questions covering topics like the C program structure, bubble sort algorithm, structures, file handling functions, implementing a stack using arrays, and the selection sort algorithm. Students are instructed to send their semester and specialization details to a provided email or call a phone number to receive the solved assignment.
This document provides instructions for a practice in an Oracle Database 11g: PL/SQL Fundamentals course. It includes:
1. Instructions on setting up the workspace and creating a database connection in SQL Developer.
2. A multi-step practice assignment involving browsing database tables, writing SQL queries, and creating PL/SQL blocks with variables, comments, and logic.
3. Hints that the solutions to practices can be found in an appendix and that students should save their work in a provided labs folder.
Case Study Analysis 2The Cholesterol.xls records cholesterol lev.docxwendolynhalbert
Case Study Analysis 2
The Cholesterol.xls records cholesterol level data for individuals. Descriptions for the data follow:
· Cholesterol: Cholesterol level (mg/dL)
· Income: annual income in $
· Age: age of individual
· Jogging: number of hours an individual spends on jogging a day
· Saturated fat: the amount of saturated fat an individual takes a day (g)
(A) Develop an estimated regression equation that can be used to predict Cholesterol level using age, jogging income, and saturated fat. Discuss your findings including interpretation of slope of each variable and significance, using at least 200 words. Use .
(B) Starting with the estimated regression equation developed in part (A), delete any independent variables that are not statistically significant and develop a new estimated regression equation that can be used to predict Cholesterol level. Use . Discuss your findings including interpretation of slope of each variable and significance, using at least 200 words. Use .
(C) Compare model (A) and (B) in terms of R^2 and which model fits the data better? Discuss this using at least 100 words
(D) In model B, what are the most important factors affecting Cholesterol level? What are the least important factors? Discuss this using at least 100 words
Assignment1DueTHURSDAY.zip
Assignment1/Assignment1-17.pdf
ICT209 Assignment 1, Murdoch University 2016
ICT209 Assignment 1, Murdoch University 2016 1
ICT209 Assignment 1 2016
Objectives:
• Demonstrate that you can do Object Oriented design
• Demonstrate that you can write Object Oriented programs using C++.
• Demonstrate that you can design and write programs using user defined data structures.
• Demonstrate that you can work with data files.
• Demonstrate that you can write test plans and show evidence of systematic testing.
• Demonstrate that you can design using UML.
You do not work in groups for this assignment, as this is an individual assignment.
Worth:
14% of the unit
Due:
Midnight (end of Session 7). This would be the 7th teaching week.
How to submit (also see unit guide - section on Assignment/Project submission/return):
Singapore or Dubai Campus:
Into the assignment submission area for the unit in LMS. Follow all directions from your lecturer.
Murdoch Campus Internal students:
Into the assignment submission area for the unit in LMS.
Externals:
Into the assignment submission area for the unit in LMS.
For submitting in LMS, zip up the entire folder. Make sure that you have included all needed files. Do not
include temporary files or files not relevant to the assignment.
Name the zip file with the unit code, Assignment number, your name, student number.
ICT209Asg1JoBlogs12345678.zip
or alternatively,
ICT209_Asg1_JoBlogs_12345678.zip
Textual submissions should be type-written. External documentation can only be in the following formats:
Text (.txt)
PDF (.pdf)
RTF (.rtf)
HTML (.html)
Image formats : PNG ...
Instructions 3-5 pages double space research paper about Eric Sc.docxnormanibarber20063
Instructions
3-5 pages double space research paper about Eric Schmidt (Google)
High profile manager CEOs. Please include information about this person’s personal and professional background, management style and skills and research about why this person is (or is not) such an effective manager/leader. You should utilize at least three articles dated from 2008 to present as references.
Paper should contain the following:
· Title page
· An introduction3-5 pages (double-spaced, no more than 12 pt. font) of cited research in APA format.
· A conclusion
· Reference page in APA format (Including at least three articles on management dated from 2008 to present)
Paper should include three sections: the Title Page, Main Body, and References. An Abstract in not necessary for this paper.
EECE237/ATT00001.htm
__MACOSX/EECE237/._ATT00001.htm
EECE237/ATT00002.htm
__MACOSX/EECE237/._ATT00002.htm
EECE237/ATT00003.htm
__MACOSX/EECE237/._ATT00003.htm
EECE237/ATT00004.htm
__MACOSX/EECE237/._ATT00004.htm
EECE237/ATT00005.htm
__MACOSX/EECE237/._ATT00005.htm
EECE237/Lab 01 Notes.pdf
EECE 237 Lab 01 Setup Notes
Fall Semester 2016
I. Communicate with the Launchpad by PuTTY in your PC.
From Computer Management of your Microsoft Windows, check which COM port is
connected with your Launchpad.
For example, the following case (a PC running Windows 10) shows it is COM3.
Open PuTTY, choose “serial” for the connection mode. Set the “Serial Line” to the port you
are using, and set the “Speed” to 115200.
II. Tiva Software (TivaWare for C series)
http://www.ti.com/tool/sw-tm4c
Install “SW-TM4C-2.1.3.156”. The Keil RealView MDK is now ARMKeil MDK. If the installed
TivaWare locates in C:\ti, the example “Hello” project is in “C:\ti\TivaWare_C_Series-
2.1.3.156\examples\boards\ek-tm4c123gxl”.
http://www.ti.com/tool/sw-tm4c
__MACOSX/EECE237/._Lab 01 Notes.pdf
EECE237/Lab Preparation Notes.pdf
EECE 237 Lab 01 Preparation Notes
Fall Semester 2016
I. Install Keil Toolchain on your PC
The following steps describe installation of ARM Keil toolchain, the MDK ARM (MDK is the
abbreviation of Microcontroller Development Kit). It is highly recommended that you have access to a
PC or a laptop running Windows 7, 8, or 10. The functioning of the toolchain is not tested in Mac or
Linux boxes. Screenshots were captured from an installation in a Windows 10 PC.
1. Fill out the form at
https://www.keil.com/demo/eval/armv4.htm
Notice that we use version 4.74. Set your Company to California State University, Chico. Set your
device to TM4C123. It should not cost any money. You can select or not select whether you
want email from ARMKeil.
Submit the form after you finish it.
2. You will see a download link similar to the following:
Download the software MDK474.EXE.
3. Run the MDK474.EXE file. Install the application in some place that is easy to find, for example
C:\Keil or D:\Keil.
https://www.keil.com/de.
CSC388 Online Programming Languages Homework 3 (due b.docxannettsparrow
CSC388 Online Programming Languages
Homework 3
(due by midnight on Sunday, April 30th)
HW3 must be submitted electronically. Your submission must include 2 files:
(a) The source code in R5RS,
(b) 1-2 page comparison of Java and Scheme. Based on the code from HW2 and HW3, write a
short comparison of Java and Scheme using the language evaluation criteria from Chapter 1.
How do they compare in terms readability, simplicity, orthogonality, and writability? For which
applications does Scheme seem better than Java, and for which applications would you prefer
Java over Scheme?
Pack all your files in a zip file. Use the following naming conventions. If your name is John
Smith, then your file name must be jsmith.zip. Homeworks which are not properly named or
packed will receive 0 points.
Write a function two-subsets in Scheme that takes a list L of positive integers (duplicates are
possible, zero is not considered a positive integer) and some auxiliary parameters of your choice.
The function two-subsets returns #t if the list L contains two subsets with equal sums of elements
and with equal numbers of elements. Otherwise (if two subsets satisfying the condition above do
not exist), the function returns #f. Assume that the list L contains at least two integers.
Note the difference from HW2: here, it is not required that the whole list be split into two subsets.
In HW3, some elements of the list could be left out from the two subsets. Therefore, every list,
which is a solution to HW2 is also be a solution to HW3. However, there are solutions to HW3
that are not solutions to HW2.
It is up to you to choose the auxiliary parameters that two-subsets takes. All auxiliary parameters
must be numeric (not lists) and should have initial values set to zero. For example, if L is ‘(1 2 3)
and if you decide to use two additional auxiliary parameters, then two-subsets must be called as
follows:
(two-subsets '(1 2 3) 0 0)
If there are three auxiliary parameters, then the function must be called:
(two-subsets '(1 2 3) 0 0 0) and so on.
Note that the function must be called two-subsets. Other names will not be accepted. The list must
precede the auxiliary parameters, which are initially set to zeroes.
There is no need to optimize your code. Try to come up with a working solution.
Examples (for the sake of illustration, two auxiliary parameters are used):
(two-subsets '(7 7) 0 0) returns #t. The two subsets are {7} and {7}.
(two-subsets '(7 7 1) 0 0) returns #t. The two subsets are {7} and {7}.
(two-subsets '(5 3 2 4) 0 0) returns #t. The two subsets are {2, 5} and {3, 4}.
(two-subsets '(5 3 21 2 4) 0 0) returns #t. The two subsets are {2, 5} and {3, 4}.
(two-subsets '(2 13 7 5 16 11) 0 0) returns #t. The two subsets are {7, 11} and
{5, 13}.
(two-subsets '(1 2 3 6 9) 0 0) returns #f.
(two-subsets '(10 4 7 102 36 6 17 54) 0 0) returns #f.
The whole solution must be packed in one recursive functio.
This document contains an agenda for a lesson on Python programming. The lesson plan includes:
- A 10 minute warm up about programming
- A 15 minute presentation about Python
- A 5 minute video about Python
- Practical work where students work in pairs to create a simple Python program
- A 5 minute question and answer session as a pre-test on Python
- A 5 minute reflection
- A discussion of homework for 5 minutes
The lesson aims to help students gain experience designing, implementing, testing and debugging Python programs that use different data types, variables and constants.
Csec 640 Enthusiastic Study / snaptutorial.comStephenson54
CSEC640 - Weeks 4 and 5 Individual Assignment
Description
The course module #4 covers very important concepts of how Denial of Service (DoS) attacks work.
However, the module does not discuss detection, prevention, or mitigation of DoS attacks (or
Distributed DoS). The task of this individual assignment is to write a research paper/report in these
topics.
Topic of the Paper:
CSCI 2215 — Databases — Fall 2015HW 1, Due Friday, 092515.docxfaithxdunce63732
CSCI 2215 — Databases — Fall 2015
HW 1, Due: Friday, 09/25/15 L. Page
• Please read the policies on plagiarism and on homework guidelines (in the course outline handed out on the first
day) and remember that I enforce these policies.
• The extra credit problems are to be done on separate sheets of paper and can be handed in up to the day of the
final exam.
• Quiz 1 (open book, open notes) will be on the following week, on Thursday,Oct. 1 in the last 45 minutes of class
and will cover topics from the following list: Chapter 1: Introduction. Chapter 3: Relational Model, Chapter 4:
SQL DDL
• Email submissions will not be accepted.
• You will need to create a gmail or Yahoo account to email Access Files to me. You will need to send me your
databases for HW1, HW2, and the course project to [email protected]
• For Problem 2 and Problem 5, I have put on blackboard Premiere Products database as ”hw1database LP”
which you need to use for this problem; do not use the Premiere Products database inclass1 since that has been
modified from the original.
• For Problem 2 and Problem 5, you can do the implementation in either Microsoft Access or another relational
DBMS of your choice. If you are doing this in another DBMS, it is your responsibility to make sure you have
the same tables, by either entering the same data yourself or by transforming the Access data. Also, if you are
using another DBMS, please indicate clearly which DBMS you are using.
1. (15 points)
Consider the following six relations for an order-processing database application in a company:
CUSTOMER (CustId, Cname, City)
ORDER (OrderId, OrdDate, CustId, OrdAmt)
ORDERITEM (OrderId, ItemId, Qty)
ITEM (ItemId, UnitPrice)
SHIPMENT (OrderId, WarehouseId, ShipDate)
WAREHOUSE (WarehouseId, City)
OrdAmt refers to total dollar amount of an order; OrdDate is the date the order was placed; ShipDate is the
date an order is shipped from the warehouse. A single order can be shipped from several warehouses.
In a manner similar to Elmasri Figure 3.7, specify the primary keys (by underlining) and the foreign keys (by
drawing arrows) in this relational schema.
2. (15 points) You have to implement this using the Premier Products database. Create a new table MyCustomer
which has two columns MyCustNum, and MyRepNum.
(a) The primary key should be MyCustNum.
(b) MyCustNum will be a foreign key to CustomerNum in the Customer table.
(c) MyRepNum will be a foreign key to RepNum in the Rep table.
(d) Enter the following information in the MyCustomer table: first row: MyCustNum = 462 and MyRepNum
= 65; second row: MyCustNum = 408 and MyRepNum = 35
(e) Show that the primary key constraint is being correctly enforced by trying to enter another row with the
following information: MyCustNum = 462 and MyRepNum = 35
(f) Show that the foreign key constraint is being correctly enforced by trying to enter another row with the
following information: MyCustNum = 325 and MyRepNum = 40
You need to turn in the foll.
This document contains instructions for a take-home final exam for an IE 535 computer simulation course. It includes 5 questions - the first asks students to analyze a single queueing system using given arrival and service times, the second through fourth ask students to solve problems from a textbook on simulation modeling, and the fifth asks students to perform a literature survey on a simulation modeling topic and summarize their findings. It also provides a format for students to follow when reporting on their network modeling problems.
matmultHomework3.pdfNames of Files to Submit matmult..docxandreecapon
matmult/Homework3.pdf
Names of Files to Submit: matmult.s, knapsack.s, combs.s ReadMe.txt
• If you are working in a group ALL members must submit the assignment
• All programs should compile with no warnings when compiled with the -Wall option
• All prompts for input and all output must match my prompts/output. We use a program to grade
your work and tiny differences can cause your work to be marked as a 0.
◦ The best way to avoid being deducted points is to copy the prompt/unchanging portion of
the outputs into your code. Make sure to get the spaces as well.
• You must also submit a file called ReadMe.txt. Include the names of all partners and any
trouble you had on the assignment
• An example ReadMe.txt has been included with this assignment
• The input in the examples has been underlined to help you figure out what is input and what is
output
• Submit your work on Smartsite by uploading each file separately. Do not upload any folders or
compressed files such as .rar, .tar, .targz, .zip etc.
• If you have any questions please post them to Piazza
• RESTRICTIONS:
◦ For all programs in this homework you
▪ May not have a data section. If you need extra space you must use the stack.
▪ Not call any C functions that you write. You may make use of any of the library
functions.
1. (Time: 3.5 hours. Lines of Code 257) Write a program called matmult.s that implements matrix
multiplication in assembly. If you don't know how to do matrix multiplication your can find a
tutorial here.
1. This program should be callable from C and have the following signature:
1. int** matMult(int **a, int num_rows_a, int num_cols_a,
int** b, int num_rows_b, int num_cols_b);
2. This function should multiply matrices a and b together and return the result
3. You must allocate space for this new matrix by calling malloc
2. You have been given a C file called main.c that accepts as command line arguments the
names of two files that contain the matrices to be multiplied. main.c will read in these
matrices, call your function, and then display the result. After it has displayed the result it
will then free the space that has been malloced.
1. Your function must be callable by this file
3. You have also been given a makefile that should compile your program. Your program
MUST be able to be compiled by this makefile. For those of you running 64 bit versions of
Linux you may need to install the 32 bit binaries. I was able to do this on my machine by
installing multilib for gcc. To do this I clicked on the Ubuntu Software App and then
searched for multilib. I selected the one for gcc, installed it, and everything was good to go.
If that doesn't work for you, you might find this this post helpful. If neither solution works
for you please Google and see what you can find. If you find a solution that works for you
please post it to Piazza.
Example:
cat mata/0-test.txt
3
3
470 -192 -539
235 -814 -538
-503 -418 541
cat matb/0-test.txt
3
3
31 ...
Introduction Ideally, program andor policy interventio.docxMargenePurnell14
Introduction Ideally, program and/or policy interventions must seek to address an identified challenge/gap in a given sector/segment of society (McDavid & Hawthorn, 2013). To enable stakeholders make informed decisions on what program/policy choices to make there is the need for information and such information can be gathered through a process known as evaluation – the outcome of an evaluation process creates/provides information and this information influences policy choices and/or programmatic interventions (McDavid & Hawthorn, 2013). In this post, I briefly describe the Mentoring Gang Involved-Youth Project with is being implemented by Roca Inc, a Massachusetts-based nonprofit working with young male adults from Boston, Chelsea, and Springfield Massachusetts. I also explain the type of evaluation employed in evaluating the Project and the kind of data used for the evaluation and I indicate whether comparisons were used. Description of the project According to the Justice Center: Council of State Governments (2012), the Mentoring-gang Involved-Youth Project, targets young male adults between the ages of 17 and 24 who are suffering from substance abuse and are in detention. The primary objective of the Project is to reduce incarceration rates and enhance the ability of participants to retain employment (Roca, 2016). Under the Project, it is recognized that participants lack healthy relationships that will help them say away from criminal and/or antisocial behavior hence under the program three types of mentoring support are offered (Justice Center: Council of State Governments, 2012). The Justice Center: Council of State Governments (2012) informs its readers that mentoring support, under the Project, extends to supporting participants get jobs and remain employed. The project proceeds under the philosophy that keeping participants occurred by positive activities steers them away from antisocial criminal behavior (Justice Center: Council of State Governments, 2012). Some of the mentors under the Project have served jail time and successfully reintegrated into the community and are deemed to be role models hence using them to mentor participants is seen as offering participants with real life examples of persons who were just like them and have managed to emancipate themselves from the hands of criminal/antisocial conduct and are living better lives. Cognitive-restructuring is the objective of the Project and it seeks to achieve this through skills development and behavioral change for/of participants (Roca, 2016). Where this Project successfully restructures the cognitive behavior of participants and they acquire skills and get employment, their economic situation will change and this will translate into economic development. According to Roca (2016) the Project runs for four years - the first two years focus on inculcating into participants behavioral change whilst the remaining period focuses on sustaining the positive ch.
INTRO TO PUBLIC ADMINISTRATIONCase Study 11 Who Brought Bern.docxMargenePurnell14
INTRO TO PUBLIC ADMINISTRATION
Case Study 11: Who Brought Bernadine Healy Down? Case Study 11: Who Brought Bernadine Healy Down? Questions for Case study 11 1.Identify and discuss the public service culture present in the case and explain why Wise argue that public service motivation is found more in the government than in private sector. 2.Discuss if the Healy’s motivation for accepting the Red Cross presidency is in line with the public service motives? 3.Discuss what the case study indicates about the modern complexities of professional personnel in the public setting? 4.Does the Wise reading offer some specific answers to contemporary problems of public personnel motivation? If so, how?
.
More Related Content
Similar to CSE 1310 – Spring 21Introduction to ProgrammingLab 4 Arrays and Func
CSE 110 - ASSIGNMENT # 4 – Fall 2015 Due Tuesday Octobe.docxfaithxdunce63732
CSE 110 - ASSIGNMENT # 4 – Fall 2015
Due: Tuesday October 6 by 10:00AM Maximum Points: 20 pts
Topics
• Loops (Chapter 4)
Note: Your programming assignments require individual work and effort to be of any
benefit. Every student must work independently on his or her assignments. This means that every
student must ensure that neither a soft copy nor a hard copy of their work gets into the hands of
another student. Sharing your assignments with others in any way is NOT permitted.
Violations of the University Academic Integrity policy will not be ignored. The university academic
integrity policy is found at http://www.asu.edu/studentaffairs/studentlife/judicial/academic_integrity.htm
Use the following Guidelines:
• Give identifiers semantic meaning and make them easy to read (examples numStudents,
grossPay, etc).
• Keep identifiers to a reasonably short length.
• User upper case for constants. Use title case (first letter is upper case) for classes. Use lower
case with uppercase word separators for all other identifiers (variables, methods, objects).
• Use tabs or spaces to indent code within blocks (code surrounded by braces). This includes
classes, methods, and code associated with ifs, switches and loops. Be consistent with the
number of spaces or tabs that you use to indent.
• Use white space to make your program more readable.
• Reasonably good amount of comments should be added in your program so that it is easy
for other people to understand it. Please see the comment style in the textbook.
Important Note:
All submitted assignments must begin with the descriptive comment block. To avoid losing trivial
points, make sure this comment header is included in every assignment you submit, and that it is
updated accordingly from assignment to assignment. (If not, -1 Pt)
//***********************************************************
// Name: your name
// Title: title of the source file
// Author: (if not you, put the name of author here)
// Description: Write the description in your words.
// Time spent: how long it took you to complete the assignment
// Date: the date you programmed
//**********************************************************
http://www.asu.edu/studentaffairs/studentlife/judicial/academic_integrity.htm
http://www.eas.asu.edu/%7Ecsedept/
Part 1: Writing Exercise: (5 pts)
The following are the exercises about the loops in Java. Write the answers in a comment block
before the code of Part2.
a. What are the three required expressions of a for-loop? (1 pts)
b. Consider the following code. This code was written to generate the output as shown in
Output 2. However, there is an error in this code. Correct the code so that it is able to
generate the desired output. (2 pts)
int count = 0;
while (count < 10)
{
System.out.println("count:" + count);
}
Output 2
count:0
count:1
count:2
count:3
.
In this lab you will learn how to use the Java Software Development Kit (SDK) with the Eclipse programming tool. In addition, you will create three simple Java programs.
This document provides instructions for completing a lab assignment involving the creation of three Java programs using Eclipse. The programs are: 1) ShowEscapeSequences, which displays text on separate lines using escape sequences; 2) Circle, which calculates and displays the diameter, circumference, and area of a circle given the radius; and 3) PracticeArithmeticOperators, which performs arithmetic operations on two user-input numbers and displays the results in a table. Students are instructed to include specific comments and output in their programs and submit source code files in a zip folder.
Cis 1403 lab1- the process of programmingHamad Odhabi
This lab aims to develop students knowledge and skills needed to create a simple programming code. It covers the process of developing computer programs starting from a simple analysis of the problem, identifying outputs, inputs, and design process/algorithm, convert algorithm to code, testing, and documentation. The student will be introduced to the Java program structure, numerical variable and high-level introduction to data types. The lab does not go into depth explaining the data types and memory storage. These will be discussed in the upcoming labs. Also, the student will be introduced to the REPL cloud environment that will be used to create a simple application.
The document provides instructions for an assignment to design a program that calculates the sum, smallest value, and largest value of a list of numbers entered by a user. The program should prompt the user to enter a number or end the program. It will continuously update the sum, minimum, and maximum. The assignment requires an analysis of the problem, program design including flowcharts and pseudocode, and sample test data.
This document provides instructions for completing the first lab assignment in CIS/355. Students will create three Java programs - ShowEscapeSequences, Circle, and PracticeArithmeticOperators. Each program must include comments with the program name, student name, and description. Students should save the Java source files, class files, and program outputs in a Word document and submit all files in a single zip folder with a specific naming convention. The document provides details on what each program should display or calculate, as well as grading rubrics for each program.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Question 1 briefly respond to all the following questions. make YASHU40
This document contains instructions and questions for a computer science assignment on functions in Python. It asks the student to write functions to find the maximum of three values, convert temperatures between Celsius and Fahrenheit, calculate factorials recursively, and more. It provides examples and asks the student to explain their work, show code/screenshots, and submit all work in a zip file.
This document describes Lab 4, which involves creating and traversing a binary tree to sort student data in C or C++. Students will write functions to insert nodes into the binary tree based on student IDs and print out the sorted tree. The lab instructions specify creating a makefile, testing the code with sample input, running it on a provided test file, and submitting the required files in a tarball.
<a href="https://www.a1autorecycling.com.au/car-removal-gold-coast/">Car removal gold coast</a> is the best in the cash for cars removal services provider in brisbane.
Bt0065, c programming and data structuressmumbahelp
This document provides information about a fully solved assignment for the subject of C Programming and Data Structures for the first semester of a B.Sc IT program. It includes 6 questions covering topics like the C program structure, bubble sort algorithm, structures, file handling functions, implementing a stack using arrays, and the selection sort algorithm. Students are instructed to send their semester and specialization details to a provided email or call a phone number to receive the solved assignment.
This document provides instructions for a practice in an Oracle Database 11g: PL/SQL Fundamentals course. It includes:
1. Instructions on setting up the workspace and creating a database connection in SQL Developer.
2. A multi-step practice assignment involving browsing database tables, writing SQL queries, and creating PL/SQL blocks with variables, comments, and logic.
3. Hints that the solutions to practices can be found in an appendix and that students should save their work in a provided labs folder.
Case Study Analysis 2The Cholesterol.xls records cholesterol lev.docxwendolynhalbert
Case Study Analysis 2
The Cholesterol.xls records cholesterol level data for individuals. Descriptions for the data follow:
· Cholesterol: Cholesterol level (mg/dL)
· Income: annual income in $
· Age: age of individual
· Jogging: number of hours an individual spends on jogging a day
· Saturated fat: the amount of saturated fat an individual takes a day (g)
(A) Develop an estimated regression equation that can be used to predict Cholesterol level using age, jogging income, and saturated fat. Discuss your findings including interpretation of slope of each variable and significance, using at least 200 words. Use .
(B) Starting with the estimated regression equation developed in part (A), delete any independent variables that are not statistically significant and develop a new estimated regression equation that can be used to predict Cholesterol level. Use . Discuss your findings including interpretation of slope of each variable and significance, using at least 200 words. Use .
(C) Compare model (A) and (B) in terms of R^2 and which model fits the data better? Discuss this using at least 100 words
(D) In model B, what are the most important factors affecting Cholesterol level? What are the least important factors? Discuss this using at least 100 words
Assignment1DueTHURSDAY.zip
Assignment1/Assignment1-17.pdf
ICT209 Assignment 1, Murdoch University 2016
ICT209 Assignment 1, Murdoch University 2016 1
ICT209 Assignment 1 2016
Objectives:
• Demonstrate that you can do Object Oriented design
• Demonstrate that you can write Object Oriented programs using C++.
• Demonstrate that you can design and write programs using user defined data structures.
• Demonstrate that you can work with data files.
• Demonstrate that you can write test plans and show evidence of systematic testing.
• Demonstrate that you can design using UML.
You do not work in groups for this assignment, as this is an individual assignment.
Worth:
14% of the unit
Due:
Midnight (end of Session 7). This would be the 7th teaching week.
How to submit (also see unit guide - section on Assignment/Project submission/return):
Singapore or Dubai Campus:
Into the assignment submission area for the unit in LMS. Follow all directions from your lecturer.
Murdoch Campus Internal students:
Into the assignment submission area for the unit in LMS.
Externals:
Into the assignment submission area for the unit in LMS.
For submitting in LMS, zip up the entire folder. Make sure that you have included all needed files. Do not
include temporary files or files not relevant to the assignment.
Name the zip file with the unit code, Assignment number, your name, student number.
ICT209Asg1JoBlogs12345678.zip
or alternatively,
ICT209_Asg1_JoBlogs_12345678.zip
Textual submissions should be type-written. External documentation can only be in the following formats:
Text (.txt)
PDF (.pdf)
RTF (.rtf)
HTML (.html)
Image formats : PNG ...
Instructions 3-5 pages double space research paper about Eric Sc.docxnormanibarber20063
Instructions
3-5 pages double space research paper about Eric Schmidt (Google)
High profile manager CEOs. Please include information about this person’s personal and professional background, management style and skills and research about why this person is (or is not) such an effective manager/leader. You should utilize at least three articles dated from 2008 to present as references.
Paper should contain the following:
· Title page
· An introduction3-5 pages (double-spaced, no more than 12 pt. font) of cited research in APA format.
· A conclusion
· Reference page in APA format (Including at least three articles on management dated from 2008 to present)
Paper should include three sections: the Title Page, Main Body, and References. An Abstract in not necessary for this paper.
EECE237/ATT00001.htm
__MACOSX/EECE237/._ATT00001.htm
EECE237/ATT00002.htm
__MACOSX/EECE237/._ATT00002.htm
EECE237/ATT00003.htm
__MACOSX/EECE237/._ATT00003.htm
EECE237/ATT00004.htm
__MACOSX/EECE237/._ATT00004.htm
EECE237/ATT00005.htm
__MACOSX/EECE237/._ATT00005.htm
EECE237/Lab 01 Notes.pdf
EECE 237 Lab 01 Setup Notes
Fall Semester 2016
I. Communicate with the Launchpad by PuTTY in your PC.
From Computer Management of your Microsoft Windows, check which COM port is
connected with your Launchpad.
For example, the following case (a PC running Windows 10) shows it is COM3.
Open PuTTY, choose “serial” for the connection mode. Set the “Serial Line” to the port you
are using, and set the “Speed” to 115200.
II. Tiva Software (TivaWare for C series)
http://www.ti.com/tool/sw-tm4c
Install “SW-TM4C-2.1.3.156”. The Keil RealView MDK is now ARMKeil MDK. If the installed
TivaWare locates in C:\ti, the example “Hello” project is in “C:\ti\TivaWare_C_Series-
2.1.3.156\examples\boards\ek-tm4c123gxl”.
http://www.ti.com/tool/sw-tm4c
__MACOSX/EECE237/._Lab 01 Notes.pdf
EECE237/Lab Preparation Notes.pdf
EECE 237 Lab 01 Preparation Notes
Fall Semester 2016
I. Install Keil Toolchain on your PC
The following steps describe installation of ARM Keil toolchain, the MDK ARM (MDK is the
abbreviation of Microcontroller Development Kit). It is highly recommended that you have access to a
PC or a laptop running Windows 7, 8, or 10. The functioning of the toolchain is not tested in Mac or
Linux boxes. Screenshots were captured from an installation in a Windows 10 PC.
1. Fill out the form at
https://www.keil.com/demo/eval/armv4.htm
Notice that we use version 4.74. Set your Company to California State University, Chico. Set your
device to TM4C123. It should not cost any money. You can select or not select whether you
want email from ARMKeil.
Submit the form after you finish it.
2. You will see a download link similar to the following:
Download the software MDK474.EXE.
3. Run the MDK474.EXE file. Install the application in some place that is easy to find, for example
C:\Keil or D:\Keil.
https://www.keil.com/de.
CSC388 Online Programming Languages Homework 3 (due b.docxannettsparrow
CSC388 Online Programming Languages
Homework 3
(due by midnight on Sunday, April 30th)
HW3 must be submitted electronically. Your submission must include 2 files:
(a) The source code in R5RS,
(b) 1-2 page comparison of Java and Scheme. Based on the code from HW2 and HW3, write a
short comparison of Java and Scheme using the language evaluation criteria from Chapter 1.
How do they compare in terms readability, simplicity, orthogonality, and writability? For which
applications does Scheme seem better than Java, and for which applications would you prefer
Java over Scheme?
Pack all your files in a zip file. Use the following naming conventions. If your name is John
Smith, then your file name must be jsmith.zip. Homeworks which are not properly named or
packed will receive 0 points.
Write a function two-subsets in Scheme that takes a list L of positive integers (duplicates are
possible, zero is not considered a positive integer) and some auxiliary parameters of your choice.
The function two-subsets returns #t if the list L contains two subsets with equal sums of elements
and with equal numbers of elements. Otherwise (if two subsets satisfying the condition above do
not exist), the function returns #f. Assume that the list L contains at least two integers.
Note the difference from HW2: here, it is not required that the whole list be split into two subsets.
In HW3, some elements of the list could be left out from the two subsets. Therefore, every list,
which is a solution to HW2 is also be a solution to HW3. However, there are solutions to HW3
that are not solutions to HW2.
It is up to you to choose the auxiliary parameters that two-subsets takes. All auxiliary parameters
must be numeric (not lists) and should have initial values set to zero. For example, if L is ‘(1 2 3)
and if you decide to use two additional auxiliary parameters, then two-subsets must be called as
follows:
(two-subsets '(1 2 3) 0 0)
If there are three auxiliary parameters, then the function must be called:
(two-subsets '(1 2 3) 0 0 0) and so on.
Note that the function must be called two-subsets. Other names will not be accepted. The list must
precede the auxiliary parameters, which are initially set to zeroes.
There is no need to optimize your code. Try to come up with a working solution.
Examples (for the sake of illustration, two auxiliary parameters are used):
(two-subsets '(7 7) 0 0) returns #t. The two subsets are {7} and {7}.
(two-subsets '(7 7 1) 0 0) returns #t. The two subsets are {7} and {7}.
(two-subsets '(5 3 2 4) 0 0) returns #t. The two subsets are {2, 5} and {3, 4}.
(two-subsets '(5 3 21 2 4) 0 0) returns #t. The two subsets are {2, 5} and {3, 4}.
(two-subsets '(2 13 7 5 16 11) 0 0) returns #t. The two subsets are {7, 11} and
{5, 13}.
(two-subsets '(1 2 3 6 9) 0 0) returns #f.
(two-subsets '(10 4 7 102 36 6 17 54) 0 0) returns #f.
The whole solution must be packed in one recursive functio.
This document contains an agenda for a lesson on Python programming. The lesson plan includes:
- A 10 minute warm up about programming
- A 15 minute presentation about Python
- A 5 minute video about Python
- Practical work where students work in pairs to create a simple Python program
- A 5 minute question and answer session as a pre-test on Python
- A 5 minute reflection
- A discussion of homework for 5 minutes
The lesson aims to help students gain experience designing, implementing, testing and debugging Python programs that use different data types, variables and constants.
Csec 640 Enthusiastic Study / snaptutorial.comStephenson54
CSEC640 - Weeks 4 and 5 Individual Assignment
Description
The course module #4 covers very important concepts of how Denial of Service (DoS) attacks work.
However, the module does not discuss detection, prevention, or mitigation of DoS attacks (or
Distributed DoS). The task of this individual assignment is to write a research paper/report in these
topics.
Topic of the Paper:
CSCI 2215 — Databases — Fall 2015HW 1, Due Friday, 092515.docxfaithxdunce63732
CSCI 2215 — Databases — Fall 2015
HW 1, Due: Friday, 09/25/15 L. Page
• Please read the policies on plagiarism and on homework guidelines (in the course outline handed out on the first
day) and remember that I enforce these policies.
• The extra credit problems are to be done on separate sheets of paper and can be handed in up to the day of the
final exam.
• Quiz 1 (open book, open notes) will be on the following week, on Thursday,Oct. 1 in the last 45 minutes of class
and will cover topics from the following list: Chapter 1: Introduction. Chapter 3: Relational Model, Chapter 4:
SQL DDL
• Email submissions will not be accepted.
• You will need to create a gmail or Yahoo account to email Access Files to me. You will need to send me your
databases for HW1, HW2, and the course project to [email protected]
• For Problem 2 and Problem 5, I have put on blackboard Premiere Products database as ”hw1database LP”
which you need to use for this problem; do not use the Premiere Products database inclass1 since that has been
modified from the original.
• For Problem 2 and Problem 5, you can do the implementation in either Microsoft Access or another relational
DBMS of your choice. If you are doing this in another DBMS, it is your responsibility to make sure you have
the same tables, by either entering the same data yourself or by transforming the Access data. Also, if you are
using another DBMS, please indicate clearly which DBMS you are using.
1. (15 points)
Consider the following six relations for an order-processing database application in a company:
CUSTOMER (CustId, Cname, City)
ORDER (OrderId, OrdDate, CustId, OrdAmt)
ORDERITEM (OrderId, ItemId, Qty)
ITEM (ItemId, UnitPrice)
SHIPMENT (OrderId, WarehouseId, ShipDate)
WAREHOUSE (WarehouseId, City)
OrdAmt refers to total dollar amount of an order; OrdDate is the date the order was placed; ShipDate is the
date an order is shipped from the warehouse. A single order can be shipped from several warehouses.
In a manner similar to Elmasri Figure 3.7, specify the primary keys (by underlining) and the foreign keys (by
drawing arrows) in this relational schema.
2. (15 points) You have to implement this using the Premier Products database. Create a new table MyCustomer
which has two columns MyCustNum, and MyRepNum.
(a) The primary key should be MyCustNum.
(b) MyCustNum will be a foreign key to CustomerNum in the Customer table.
(c) MyRepNum will be a foreign key to RepNum in the Rep table.
(d) Enter the following information in the MyCustomer table: first row: MyCustNum = 462 and MyRepNum
= 65; second row: MyCustNum = 408 and MyRepNum = 35
(e) Show that the primary key constraint is being correctly enforced by trying to enter another row with the
following information: MyCustNum = 462 and MyRepNum = 35
(f) Show that the foreign key constraint is being correctly enforced by trying to enter another row with the
following information: MyCustNum = 325 and MyRepNum = 40
You need to turn in the foll.
This document contains instructions for a take-home final exam for an IE 535 computer simulation course. It includes 5 questions - the first asks students to analyze a single queueing system using given arrival and service times, the second through fourth ask students to solve problems from a textbook on simulation modeling, and the fifth asks students to perform a literature survey on a simulation modeling topic and summarize their findings. It also provides a format for students to follow when reporting on their network modeling problems.
matmultHomework3.pdfNames of Files to Submit matmult..docxandreecapon
matmult/Homework3.pdf
Names of Files to Submit: matmult.s, knapsack.s, combs.s ReadMe.txt
• If you are working in a group ALL members must submit the assignment
• All programs should compile with no warnings when compiled with the -Wall option
• All prompts for input and all output must match my prompts/output. We use a program to grade
your work and tiny differences can cause your work to be marked as a 0.
◦ The best way to avoid being deducted points is to copy the prompt/unchanging portion of
the outputs into your code. Make sure to get the spaces as well.
• You must also submit a file called ReadMe.txt. Include the names of all partners and any
trouble you had on the assignment
• An example ReadMe.txt has been included with this assignment
• The input in the examples has been underlined to help you figure out what is input and what is
output
• Submit your work on Smartsite by uploading each file separately. Do not upload any folders or
compressed files such as .rar, .tar, .targz, .zip etc.
• If you have any questions please post them to Piazza
• RESTRICTIONS:
◦ For all programs in this homework you
▪ May not have a data section. If you need extra space you must use the stack.
▪ Not call any C functions that you write. You may make use of any of the library
functions.
1. (Time: 3.5 hours. Lines of Code 257) Write a program called matmult.s that implements matrix
multiplication in assembly. If you don't know how to do matrix multiplication your can find a
tutorial here.
1. This program should be callable from C and have the following signature:
1. int** matMult(int **a, int num_rows_a, int num_cols_a,
int** b, int num_rows_b, int num_cols_b);
2. This function should multiply matrices a and b together and return the result
3. You must allocate space for this new matrix by calling malloc
2. You have been given a C file called main.c that accepts as command line arguments the
names of two files that contain the matrices to be multiplied. main.c will read in these
matrices, call your function, and then display the result. After it has displayed the result it
will then free the space that has been malloced.
1. Your function must be callable by this file
3. You have also been given a makefile that should compile your program. Your program
MUST be able to be compiled by this makefile. For those of you running 64 bit versions of
Linux you may need to install the 32 bit binaries. I was able to do this on my machine by
installing multilib for gcc. To do this I clicked on the Ubuntu Software App and then
searched for multilib. I selected the one for gcc, installed it, and everything was good to go.
If that doesn't work for you, you might find this this post helpful. If neither solution works
for you please Google and see what you can find. If you find a solution that works for you
please post it to Piazza.
Example:
cat mata/0-test.txt
3
3
470 -192 -539
235 -814 -538
-503 -418 541
cat matb/0-test.txt
3
3
31 ...
Similar to CSE 1310 – Spring 21Introduction to ProgrammingLab 4 Arrays and Func (20)
Introduction Ideally, program andor policy interventio.docxMargenePurnell14
Introduction Ideally, program and/or policy interventions must seek to address an identified challenge/gap in a given sector/segment of society (McDavid & Hawthorn, 2013). To enable stakeholders make informed decisions on what program/policy choices to make there is the need for information and such information can be gathered through a process known as evaluation – the outcome of an evaluation process creates/provides information and this information influences policy choices and/or programmatic interventions (McDavid & Hawthorn, 2013). In this post, I briefly describe the Mentoring Gang Involved-Youth Project with is being implemented by Roca Inc, a Massachusetts-based nonprofit working with young male adults from Boston, Chelsea, and Springfield Massachusetts. I also explain the type of evaluation employed in evaluating the Project and the kind of data used for the evaluation and I indicate whether comparisons were used. Description of the project According to the Justice Center: Council of State Governments (2012), the Mentoring-gang Involved-Youth Project, targets young male adults between the ages of 17 and 24 who are suffering from substance abuse and are in detention. The primary objective of the Project is to reduce incarceration rates and enhance the ability of participants to retain employment (Roca, 2016). Under the Project, it is recognized that participants lack healthy relationships that will help them say away from criminal and/or antisocial behavior hence under the program three types of mentoring support are offered (Justice Center: Council of State Governments, 2012). The Justice Center: Council of State Governments (2012) informs its readers that mentoring support, under the Project, extends to supporting participants get jobs and remain employed. The project proceeds under the philosophy that keeping participants occurred by positive activities steers them away from antisocial criminal behavior (Justice Center: Council of State Governments, 2012). Some of the mentors under the Project have served jail time and successfully reintegrated into the community and are deemed to be role models hence using them to mentor participants is seen as offering participants with real life examples of persons who were just like them and have managed to emancipate themselves from the hands of criminal/antisocial conduct and are living better lives. Cognitive-restructuring is the objective of the Project and it seeks to achieve this through skills development and behavioral change for/of participants (Roca, 2016). Where this Project successfully restructures the cognitive behavior of participants and they acquire skills and get employment, their economic situation will change and this will translate into economic development. According to Roca (2016) the Project runs for four years - the first two years focus on inculcating into participants behavioral change whilst the remaining period focuses on sustaining the positive ch.
INTRO TO PUBLIC ADMINISTRATIONCase Study 11 Who Brought Bern.docxMargenePurnell14
INTRO TO PUBLIC ADMINISTRATION
Case Study 11: Who Brought Bernadine Healy Down? Case Study 11: Who Brought Bernadine Healy Down? Questions for Case study 11 1.Identify and discuss the public service culture present in the case and explain why Wise argue that public service motivation is found more in the government than in private sector. 2.Discuss if the Healy’s motivation for accepting the Red Cross presidency is in line with the public service motives? 3.Discuss what the case study indicates about the modern complexities of professional personnel in the public setting? 4.Does the Wise reading offer some specific answers to contemporary problems of public personnel motivation? If so, how?
.
Introduction
GDD’s Results
Candidate’s Results
GDD/ Candidates Comparison
Recommendation
Purpose:
In the first assignment, students are given a scenario about Global Delivery Direct (GDD), a Norfolk, England medium-sized global delivery company that was started in 1968 by four college friends. . The purpose of this exercise is to see if you can identify the GDD leader in the potential candidates that will be hired to lead the new boutique services department.
Outcome Met by Completing This Assignment
use leadership theories, assessment tools, and an understanding of the role of ethics, values, and attitudes to evaluate and enhance personal leadership skills
Background:
Andrew Rockfish and the other owners have been looking for a competitive edge in the North American market that will translate well to the other divisions. A recent meeting of the owners resulted in the decision to target business organizations with custom services. The decision stems from recent feedback from customers that revealed that for GDD to anticipate the needs of their clients, suppliers and service vendors, the company needed to decrease the turnaround time in delivery and mailing of small packages and letters. Rockfish has decided to offer “boutique” services to its business customers. Catering to businesses will allow GDD to provide personal services that Fed Ex and UPS cannot offer. Customizing the services will allow GDD to increase prices while creating a new niche in the market. It was decided that the initial roll out of this idea would start in the US where an imminent threat from competition lies. Rockfish was on board with this idea and began a campaign among the rest of the company to find ideas that would help to encourage the new ‘Business First” strategic plan.
In response, a sales manager from the mid-west sales team brought this idea from their brainstorming session for Rockfish’s consideration. The sales manager proposed creating several mobile packing stores to bring customer service to businesses directly. GDD would not just pick up and deliver but they would also package. This model could be viewed as an UPS store on wheels. The team got the idea from a local delivery service that started a similar business as a Mail Store on Wheels and it seemed to be doing well. The mail company has five “Mail on Wheels” trucks and focuses on taking small business, not individuals away from the three local UPS and Kinko stores. After a financial review of the company, Rockfish decided to buy the business.
The mail business was started by a young entrepreneur, Adrian Cheng, who ran the business with the philosophy that “customers always get the best of our time and service”. Personal service, friendliness, and as much time as it takes to make the customer happy, was part of the mission statement. Employees were casually dressed and had no deadlines except those given by the customer. Cheng had about 45 employees and ran both.
IntroductionDefine the individual client or community populati.docxMargenePurnell14
Introduction
Define the individual client or community population.
This should be about 1-2 paragraphs that identify the client (or the organization).
In this section, for an A paper
, you will address the following elements:
Introduces the client or community population for whom the treatment or service plan is being developed,
Include cultural or diversity issues; also
Include the role of the social worker in supporting the client or population.
Include at least one reference that defines the importance of cultural sensitivity and the role of the social worker working with a client or organization.
Identified Issue/Situation
Describe the situation to be addressed that was identified by the client or the organization
In this section, for an A paper
, you will address the following elements:
Define the identifying issue, situation, or problem in a way that reflects client or community agency,
Discuss the cultural or diversity issues inherent in the client or community situation, and Reflects the interaction between the social worker and the client or community.
Include supporting literature from the course text or other related source.
Problem Statement
How did the client or the organization state the problem?
This should correspond to the Problem statement on the ASI Treatment Plan Template
Goals/Objectives to be Achieved
This should correspond to the Goals section of the ASI Treatment Plan Template.
In this section, for an A paper
, you will address the following elements:
Creates clearly defined objectives and goals with measurable outcomes that reflect the interaction between the social worker and the client or community.
Include literature that discusses how to define objectives and goals with measurable outcomes.
State the goals in measurable terms.
For example, “The client states a desire to quit smoking.” Or “The client states a desire to exercise more often.”
Measurable Goals
For example, the client who wants to quit smoking.
Measurable goals might be: To obtain a prescription for a nicotine patch by XXX date; to go for 3 days without a cigarette starting on XXX DATE; to call a hypnotherapist and find out about how to use hypnotherapy for changing cravings to smoke.”
Each goal should have a target completion date.
Interventions
Describe what the counselor will do to assist the client with achieving the defined goals.
Participation in Treatment Planning Process
What actions will the client (or organization) do to be involved in the plan of action?
Participation of Others in Goals and Plans
Who will the client (or organization) use to support their goals?
Indicators of Successful Completion
How will the client and counselor (or organization and manager) know that successful completion has occurred?
Parallels between Individual Treatment Plans
and Organizational Plans
Describe how an organizational plan would be the same or different from an individual treatment plan.
This is to .
Introduction to Public SpeakingWeek 6 AssignmentIn.docxMargenePurnell14
Introduction to Public Speaking
Week 6 Assignment
Informative Speech
It’s time to take what you've learned from all of your prior presentations and add an element of research to create your Informative Speech. You have to be cautious when choosing an Informative topic, as it’s easy to confuse the Informative Speech and a Persuasive Speech as the same thing. However an Informative Speech JUST provides information. The most basic informative speech is the kind that teaches us (much in the way the Demonstration Speech taught us) something detailed about a topic with which we are already familiar. For instance, we know George Washington was our first President, but a lot of people don't know much about his life prior to the military or serving in office. That would make for an interesting Informative Speech.
With an informative Speech, you’ll want to establish credibility by referencing and citing your materials. For example: "In the July 13, 2007 edition of the New York Times, John Smith said that George Washington suffered from depression as a young boy." It is critical that you discuss where you found your information in order to maintain your credibility.
A few parameters:
1. Your speech should be 5-10 minutes in length.
2. Feel free to incorporate visual aids. This is not mandatory, but it makes for a better presentation, as we learned last week.
3. Cite a minimum of two different sources for your materials. Do NOT use Wikipedia as a source. Please copy and paste these sources into the ‘comments’ area when submitting or submit as a paper. I will evaluate your sources.
4. Be sure to have a good introduction, a body that contains at least three main points (with appropriate supporting evidence) and a conclusion that appropriately wraps everything up.
As always, you may draft your speech word for word, but be very careful not to simply read from your paper! We want eye contact and emotion! Good luck with this assignment and have fun!
.
Introduction about topic Intelligence phaseWhat is the .docxMargenePurnell14
Introduction about topic
Intelligence phase
:
What is the problem (opportunity)
Classify the problem (opportunity)
structurt ,unstructuer ,semi structur
i think our search structure
Decompose the problem (opportunity).
The effects of noise on student performance
The effects of temprutur on student performance
The effects of light on student performance
.
Introduction A short summary is provided on the case subject and.docxMargenePurnell14
Introduction
A short summary is provided on the case subject and discuss Effat University ICT infrastructure sustainability in 3 pillars (Planet, People, and Profit).
Analysis
(due April 16)
Study the ICT infrastructure of Effat University and provide an analysis of its performance in terms of Green Measures of Performance (Green MoPs).
.
Introduction Illiteracy is the inability to read and write a.docxMargenePurnell14
Introduction
Illiteracy is the inability to read and write at an adequate level of proficiency that is critical for communication. Illiterate adults are unable to use printed and written information to function in the society so as to achieve one’s goals and also to develop one’s potential.
According to an international nonprofit ProLiteracy in 2003, there are 36 million adults in the United States alone. This potential includes a broad range of information-processing skills that one can use daily in school and at the community as a whole. Adult illiteracy has become a societal problem because illiterate people can never fully utilize writing and reading skills to make use of their fully potential in the world. The thesis statement of adult illiteracy involves reasons why it identified as a societal problem; the solutions proposed to solve this problem and the statistical information of adult literacy as the global societal problem.
Different types of society exist. These types of illiteracy are technological illiteracy, mathematical illiteracy, visual illiteracy, school illiteracy, community illiteracy and personal illiteracy. All these types of illiteracy are caused by various reasons. These reasons are summarized in the following discussion.
Causes of Adult Illiteracy
People are usually mistaken about illiteracy. School illiteracy is overvalued to the extent that many adults have started to believe the act of reading and writing are the only important things in school. It is this type of reasoning that make many adults less interested in wanting to gain more knowledge and see things beyond the negative images. This has become one of the main reasons why adult illiteracy has increased in the world over the last few years.
Another reason for adult illiteracy is the misuse of groups. Some people tend to agree with the argument that can make one believe that he or she is weak as a reader and he or she won’t be able to achieve literacy even after finishing school. This type of thinking lowers someone’s self-esteem and self-confidence meaning that the person will not bother to seek literacy help. People’s reading attitude are influential in literacy behaviors. According to McKenna in 2001, reading attitudes are influenced by factors such as a person’s social experiences with reading, one’s personal experiences, the cultural norms about reading, cultural norms and the learner’s preferences about reading. Attitude is associated with unwillingness to read. Every learning experience that a child has in school will at some point determine how that child will determine to learn. The learners who have had negative experiences in school will come to view school and learning in total as a bad experience that. This disengagement spreads over to adults. An adult learner who has negative perceptions about school would not want to be associated with it. These learners never get interested in educational process because they don’t see it as valuabl.
Intro to Quality Management Week 3Air Bag Recall.docxMargenePurnell14
Intro to Quality Management Week 3
Air Bag Recall
Assignment
Review the article “Blow Out” from this week’s reading assignment. This article pertains to the recall of air bag products. Assume you are the manager for a large automotive company that will be using air bags in your products. What risk assessment tools will you use in order to ensure that the product being installed into your vehicles meets safety standards in order to avoid a recall? Use your course materials and outside research to generate a solid analysis on why these methods would be helpful. Your analysis should be supported by research.
Directions for obtaining the file: Login to the Grantham University library by clicking on the Resources tab from the main page. You will then log into EBSCOHost. Once you have accessed the database, simply copy and paste the title of the article and press enter to search and you should now have the file accessible to review.
The requirements below must be met for your paper to be accepted and graded:
•Write between 750 – 1,250 words (approximately 3 – 5 pages) using Microsoft Word in APA style, see example below.
•Use font size 12 and 1” margins.
•Include cover page and reference page.
•At least 80% of your paper must be original content/writing.
•No more than 20% of your content/information may come from references.
•Use at least three references from outside the course material, one reference must be from EBSCOhost. Text book, lectures, and other materials in the course may be used, but are not counted toward the three reference requirement.
•Cite all reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) in the paper and list on a reference page in APA style.
Article
Section:
Features
Business: Cars
Keywords: Safety; Automotive industry; Driving; Accidents; Brain; Congress; Design; Regulations; Vehicles; Weight; Fariello; Cars
Air bags are meant to save lives. Now a massive recall shows how they sometimes can turn deadly
Forensic Investigator Sal Fariello, whose job is to deconstruct car crashes, has witnessed a catalog of carnage caused by air bags over the past two decades. In his collection, there is a photo of a woman who has been horribly scarred by an inflating air bag. There's an X-ray of a driver's broken wrists snapped in the "fling zone" of an air bag that mashed both arms from a 10-and-2 position into the car's roof. He can cite numerous drivers who suffered torn aortas or lacerated brain stems, all the result of being "punched" by an air bag inflating at 200 m.p.h. (322 km/h). "What's sitting in the front of the steering wheel is an explosive device," explains Fariello, the author of Airbag Injuries: Causation & Federal Regulation. "Nasty, unexpected events can occur."
None have been nastier than the injuries and deaths caused by exploding inflators in air bags made by automotive supplier Takata Corp., based in Tokyo. Its air bags have .
Intro to Quality Management Week 3Air Bag RecallAssignment.docxMargenePurnell14
Intro to Quality Management Week 3
Air Bag Recall
Assignment
Review the article “Blow Out” from this week’s reading assignment. This article pertains to the recall of air bag products. Assume you are the manager for a large automotive company that will be using air bags in your products. What risk assessment tools will you use in order to ensure that the product being installed into your vehicles meets safety standards in order to avoid a recall? Use your course materials and outside research to generate a solid analysis on why these methods would be helpful. Your analysis should be supported by research.
Directions for obtaining the file: Login to the Grantham University library by clicking on the Resources tab from the main page. You will then log into EBSCOHost. Once you have accessed the database, simply copy and paste the title of the article and press enter to search and you should now have the file accessible to review.
The requirements below must be met for your paper to be accepted and graded:
•Write between 750 – 1,250 words (approximately 3 – 5 pages) using Microsoft Word in APA style, see example below.
•Use font size 12 and 1” margins.
•Include cover page and reference page.
•At least 80% of your paper must be original content/writing.
•No more than 20% of your content/information may come from references.
•Use at least three references from outside the course material, one reference must be from EBSCOhost. Text book, lectures, and other materials in the course may be used, but are not counted toward the three reference requirement.
•Cite all reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) in the paper and list on a reference page in APA style.
Article
Section:
Features
Business: Cars
Keywords: Safety; Automotive industry; Driving; Accidents; Brain; Congress; Design; Regulations; Vehicles; Weight; Fariello; Cars
Air bags are meant to save lives. Now a massive recall shows how they sometimes can turn deadly
Forensic Investigator Sal Fariello, whose job is to deconstruct car crashes, has witnessed a catalog of carnage caused by air bags over the past two decades. In his collection, there is a photo of a woman who has been horribly scarred by an inflating air bag. There's an X-ray of a driver's broken wrists snapped in the "fling zone" of an air bag that mashed both arms from a 10-and-2 position into the car's roof. He can cite numerous drivers who suffered torn aortas or lacerated brain stems, all the result of being "punched" by an air bag inflating at 200 m.p.h. (322 km/h). "What's sitting in the front of the steering wheel is an explosive device," explains Fariello, the author of Airbag Injuries: Causation & Federal Regulation. "Nasty, unexpected events can occur."
None have been nastier than the injuries and deaths caused by exploding inflators in air bags made by automotive supplier Takata Corp., based in Tokyo. Its air bags have been blamed for killing five motorists in.
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docxMargenePurnell14
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERS
Resources
Discussion Participation Scoring Guide
.
Interview With American Indian Community Practitioners
Interview with Betty Laverdure
LAUNCH INTERVIEW
|
Transcript
Interviews With American Indian Community Practitioners
Interview with Denise Levy
LAUNCH INTERVIEW
|
Transcript
Values, communication, beliefs, economics, clothing, assumptions, and interpretation are all part of cultural dynamics. Understanding this, review the interviews with American Indian community practitioners. Listen for their expectations toward culturally appropriate ways in which to communicate and work with tribal communities.
Provide a synopsis of the interviews and address the following questions.
How do cultural dynamics impact collaboration?
What are the cultural dynamics at play?
How will you use the information to better understand working with American Indian communities?
.
Interview Each team member should interview an educator about his.docxMargenePurnell14
Interview:
Each team member should interview an educator about his or her philosophy of education.
Consider
the following questions regarding the challenges facing education today:
Where do they think education is headed in the future?
How have their own life experiences shaped their current philosophy regarding education?
Ask 6 questions including the two above.
.
IntroductionRisk management is critical to protect organization.docxMargenePurnell14
Introduction
:
Risk management is critical to protect organizational assets and to ensure compliance with laws and regulations. Many individuals and departments in organizations are involved in risk management; this is especially true when creating a risk management plan.
You, as an employee of YieldMore, are asked to create a risk management plan for the organization.
Scenario
:
In order to help protect the company and ensure it maintains compliance with laws and regulations, senior management at YieldMore has decided to develop a formal risk management plan.
As an employee of YieldMore, your team has been given the task of creating a risk management plan for the organization.
Tasks
:
You will initiate a kick-off meeting to discuss YieldMore’s risk management plan with your team.
Review the responsibilities associated with your assigned role.
Explain the specific responsibilities of your assigned role within the project.
Explain your role and the roles of the other team members to senior management.
.
Interview two different individuals regarding their positions in soc.docxMargenePurnell14
Interview two different individuals regarding their positions in society. Analyze their responses regarding:
Identify each person’s class, race, and gender.
What role has class, race, and gender played in their lives? How do you see these stratifiers as playing a role, even if the interviewee is unaware of it?
Apply one of the sociological perspectives (structural-functional, social-conflict, or symbolic-interaction) to the individuals’ lives. Why did you choose this particular perspective? How does it explain each person’s life and life choices?
What are some the benefits and limitations to using interview as a research methodology?
Analyze each person’s components of culture (language, symbols, material objects, and behaviors) and relate them to his/her stratified position in society.
Please post your completed paper in the
M5: Assignment 1 Dropbox
.
Assignment 1 Grading Criteria
Maximum Points
Described each person’s class, race, and gender.
40
Evaluated the role of social stratification.
.
Internet ExerciseVisit the homepage of Microsoft at www.micros.docxMargenePurnell14
Internet Exercise
Visit the homepage of Microsoft at www.microsoft.com. Access the annual report for 2012. Find the footnotes to the statements and read the disclosures in the note titled Contingencies. Regarding the events described, do you think Microsoft is providing adequate disclosure to its stockholders?
.
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docxMargenePurnell14
Interpersonal Violence Against Women, The Role of Men by Martin Schwartz and Walter DeKeseredy.
Respond to questions 1-3 at the end of the reading.
1- How is ininate partner violence a "male" issue?
2- how dose a patriarchal society perpetuate violence against women?
3- what type of programming and interventions are necessary to stop violence against women?
.
Internet of Vehicles-ProjectIntroduction - what you plan t.docxMargenePurnell14
Internet of Vehicles-Project
Introduction - what you plan to accomplish and why, include an overview of the situation or
organization and what the situation/problem is that you intend to improve - usually 1-2 pages) Cite and support all content appropriately
o
Methodology is a research paper about Action Research, 2-3 pages (include reasons and justification for approach), minimum of five (5) professional references
Reserved for hifsa shaukat
.
Interview an ELL instructor from a Title I school about how assessme.docxMargenePurnell14
Interview an ELL instructor from a Title I school about how assessment is used for placement. You may interview one of the instructors that you have observed during your observations for this course. Inquire also about how placement is determined for both special education and gifted ELLs. Your questions might include (but should not be limited to) the following:
What are the indicators of exceptionality a classroom teacher should look for when a student also has a language barrier?
How can informal as well as formal assessment results factor into placement?
What role do parents and teachers have in placement?
What are some primary factors that are exhibited in underachievement that may not necessarily signal special education needs?
How are changes among individual ELL proficiency levels over the course of the school year accounted for?
How are diagnostic, formative, and summative assessments integrated for ELLs in mainstream classrooms?
What are the benefits of the SIOP protocol for native English speakers as well as those for whom English is an additional language?
Consolidate your findings in a 750-word essay, supporting your findings with at least three current sources from your readings and the GCU Library to support your reasoning.
.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docxMargenePurnell14
This document provides an overview of standards for information security risk management, highlighting challenges in implementing assessments and drivers for adopting standards. It analyzes frameworks including ISO 27001, ISO 27002, ISO 27005, ITIL, COBIT, Risk IT, Basel II, PCI DSS, and OCTAVE. While these frameworks provide guidance, there is no single best solution, and organizations face challenges selecting and properly implementing a framework given their unique needs and resources. The document concludes more research is needed to guide selection of the most appropriate framework.
International Finance Please respond to the followingBased on.docxMargenePurnell14
"International Finance"
Please respond to the following:
Based on the lecture and Webtext materials, address the following:
The IMF and World Bank are the world’s two leading lending institutions, but much of their monetary assistance disappears once it enters the banking systems of developing countries. Cite concrete evidence that supports the assertion that much assistance to developing countries is simply stolen by officials. Determine other main factors that account for the misuse of these funds.
.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Digital Artefact 1 - Tiny Home Environmental Design
CSE 1310 – Spring 21Introduction to ProgrammingLab 4 Arrays and Func
1. CSE 1310 – Spring 21Introduction to ProgrammingLab 4 Arrays
and Functions
Assigned:Thursday, Apr. 15, 2020
Due:Thursday, Apr. 29, 11:59pm
Purpose:
This Lab 3 assignment is to have you practice writing your own
code from the start. You will
· write code using reading input from a file
· write some functions and call them
· use arrays to save data
· use arrays to determine things about the data
Grading
The Lab assignment will be graded out of 100 points. There are
multiple parts or tasks that make up each Lab. Each part may
have multiple tasks or problems to complete. Each task has a
point value associated with it.
Instructions for naming the files that you create for this lab
assignment: [Same as Lab 1]
This assignment requires you to create a variety of files and
folders: code files (your programs), edited files (your answer
document), and a submission folder to store all the documents
in that you must submit. Each of these files/folders will be
named using a naming convention that makes it easy to
distinguish which elements belong to which student. For each
of these files/folders the instructions will indicate how to name
the item. You will see names like XYZ1234Lab4answers,
XYZ1234Lab1Part2, or XYZ1234Lab3.
In each of these names you see "XYZ1234". This is a
placeholder for you to put in your initials and the last four
digits of your ID number, i.e. "XYZ" gets replaced with your
initials and "1234" gets replaced with the last four digits of
your UTA ID number. So if I see an instruction that says "
2. Create a NEW C application, i.e. a new C project, called
XYZ1234Lab1Part2… " and my initials are JCMT and the last
four digits of my ID are 1234, then the file that I should create
would be named JCMT1234Lab1Part2. Note that you can use
however many initials you have to replace the "XYZ". I use 4
initials so that is what I put; if you use two initials "MW", then
replace "XYZ" with "MW". You must use exactly 4 digits from
the end of your ID to replace 1234.
Don't change any other part of the given file name. If it says
XYZ1234Lab1Part2 and you are ABC and 5678 then your file
name must be ABC5678Lab1Part2. It cannot be ABC5678Part2
or ABC567812 or ABC5678LabOnePartTwo etc.
Naming summary: Use your initials and your last 4 digits of ID
in place of "XYZ1234" in the given file names. Keep all the
rest of the name as defined.
Instructions about the Answers document required for the Lab:
[Same as Lab 1]
For every lab assignment you need to create ONE Answers file.
In this Answers file you will put in the answers any questions
that are asked, you will show the output of code that you write
and you will reference any code files that you create for a given
question. All answers/outputs etc. go into the same answers
document.
· Your answers document needs to be named with your initials
and the last four digits of your ID number and then
Lab#Answers. So if my initials are JCMT and the last four
digits of my ID are 1234, then the answers file for my Lab 4
would be JCMT1234Lab4Answers. [-5 deduction if incorrectly
named]
· The ONLY acceptable file formats are Word document
(.docx), OpenOffice document(.odt), and PDF (.pdf). {-20 pt
deduction if a different but readable format is used. -100 pt
deduction if file cannot be read because of the file format.}
· Put your last name, first name and UTA ID in the file on the
first line. [-5 deduction if not]
· Label the answers for each question with the number/letter of
3. the question. Separate each answer from the next answer by at
least two blank lines. [-5 deduction if not]
· Include EVERY question number/letter combination from the
assignment in your answers document. If the question is a
coding question telling you to save a file, for example some
question numbered 17.b), then in your answers document you
should have a line like the following for question 17.b):
17.b) Please see file Lab1Part3.c for this question.”
· Put all your question answers for a lab into the same Answer
document for that lab.
· If the lab question asks you to show the output of a doing
some particular thing with the code, then you must include a
screenshot of the output in the Answer document, i.e. paste in a
screenshot picture of the output. For output that takes up more
than one screen, make multiple pictures so that every screen is
recorded. If you do not include the screenshots in your answer
document, then the questions that should have had screenshots
will be considered “Not answered” and will be awarded ZERO 0
points.
Each task below will instruct you on what type of "answer" is
required for that part of the current problem. If the task says to
“Save your program as file XYZ1234Lab1Task1.c” then this .c
file should be turned in as part of the assignment and the
appropriate reference to the .c file should be put in the answers
file as described previously.
Instructions about C files, i.e. the .c documents: [Same as Lab
1]
At the very top of every C file that you create you must put in
the following header comment block with the labels shown
below for information:
/****************************************************
**************************
* CSE 1310-005 Spring 2021
* File name:
* Author :
* Created on:
4. .*
* UTA Student Name:
* UTA ID:
*****************************************************
**************************/
In this block you will fill in the name of the file that you are
creating, the author name (this is the name that you are logged
in as), the date that the file was created, your name as UTA
records it, and your 10 digit UTA ID number. This block
should be before the first #include statement in your code.
(Note that you do not have to have an entire line of asterisks at
top and bottom. You can have /* on the first line and */ on the
last line if desired.)
The IDE you use may have a comment block at the top of your
code. You may remove any comment information that is not
useful to your assignment. You must put in the labels and
information listed above:
Example: As an example, here is a header block that was on
one of my files
/****************************************************
**************************
* File: main.c
* Author: jcmtiernan
* Created on: January 10, 2021, 12:57 PM
.*
* UTA Student Name: Dr. Carter Tiernan
* UTA ID: 1000000000
*****************************************************
**************************/
#include <stdio.h>
Additonally, you should add a comment block before main, that
adds comments to describe your program. Here is an example
/***********
* Lab X Part Y – Testing arithmetic in C
5. ***********/
int main…
Be sure to follow the naming conventions for any code file you
create.
There are further instructions at the bottom (after the questions)
about how to save the .c files you create in order to be able to
turn it in.
Lab 3 Summary of answer document and files prep
1 Create an Answers file named with your initials and the last
four digits of your ID number and then Lab#Answers that is of
file type .docx, .pdf, or .odt
2 Put lastname, firstname and UTA ID on the first line; then put
every question number into the file.
3 Make sure to put an answer or comment after every question
number. The answer might be a written answer, a pasted pic or
screenshot, or a message indicating that the answer is in an
external file.
4 Make sure that when you create your C programs, your
program includes the information header comment block shown
above including your name. Also make sure you include a
comment to describe your specific C program before main.
Remove the unneeded default messages and put in your own
messages.
5 When using other additional files in your program, plan to
include them in your assignment also.
There is info at the bottom about creating a folder for your
assignment files to be turned in and submitting the assignment.
Instructions that apply to all lab questions:
A.For later labs, if the instructions say to use code from
previous lab/question then everything from previous question
should still be in lab except what is explicitly changed in the
current question.
B.** Things not allowed in Dr. Tiernan’s 1310 class in C
programs. {More details about these things will be posted in
6. the file “Things Not Allowed”} If you use these elements in
your lab assignment C code, you will get a 0 (zero) for the
entire question where you used this element.
1) Cannot use exit
2) Cannot use break except between case statements in a switch
structure
3) Cannot use continue
4) Cannot use an intentional infinite loop such as while (true)
5) Cannot use goto
Grading Rubric for Lab 4:
Part 1: 45 points
Part 2: 40 points
Part 3: 15 points
Miscellaneous: If you have questions, e-mail Dr. T and/or the
TAs through Canvas.
Lab 4 parts to complete:
Part 1: Implement some calculations in code with file input
For this part of the lab, you are going to take some calculations
and turn them into a program. You will take input from a file as
the inputs for the program and then your program will output
the results of the calculations with the user's file inputs.
We had a Snow Week (some have called it Snowmageddon)!
And, unfortunately, many folks lost electricity, they lost water,
and/or they had broken pipes. You are going to estimate losses
associated with some of these various problems.
You are going to come up with estimate losses in Texas for a
given set of (imaginary) electricity providers. You will use the
given data to find of 1) average hours without electricity per
customer for each company, 2) total accrued hours without
electricity for each company, 3) percentage of customers who
7. lost power for each company, 4) total customers who lost power
for all companies combined, 5) percentage of customers who
lost power for all companies combined, and 6) average hours
without electricity per customer for all companies combined. In
order to calculate these losses you will use the following
formulas.
Average of a set of values v1, v2, … vN = (v1 + v2 + v3 +… +
vN) / N using floating point
Percentage of some subset out of some total set = subset / total
set * 100 using floating point
1 hour = 60 minutes; .5 hours = 30 minutes; .25 hours = 15
minutes; etc.
The input data for the program will be in the input file that is
given. [Note: This is not real data. This data is created for the
purpose of doing this lab assignment. If you really want to
know these pieces of information as relates to the storms, you'll
need to do some research on your own.] The data in the file
consists of a number of lines of information where each line has
the format below. All data on the same line refers to the same
company. The data in the file is one word followed by four
integers. When reading in this data, do NOT use arrays to store
the data. Read in the info into single variables, do the needed
calculations, print the appropriate info, then go to the next data
in the file, and read it into the same variables replacing the
previous data.
company outages customers noPowerCnt avgTimeMin
company = Electricity provider company name
outages = Number of outages for that company
customers = Total number of customers of that company
noPowerCnt = Number of customers without power for any
8. unplanned length of time
avgNoPowerMin = Average length in minutes of an unplanned
power outage
Your program should read the input from the file and calculate
all of the required information for 1 through 6 above. You
should print out the company data in a table as follows:
[NOTE: This spacing is not exact. Use the spacing in the
formatted printf given below for the spacing!]
Company Outs NumCust NoPower AvgMin AvgHrs
TotHrs Pct
Offcore 3456 1098762 114572 497 8.28 949038.47
10.43%
YellowValley 20 100000 5000 60 1 5000 5%
where Company is company, Outs is outages, NumCust is
customers, NoPower is noPowerCnt, AvgMin is
avgNoPowerMin, AvgHrs is 1) from above, TotHrs is 2), and
Pct is 3). The format for the title line should be:
printf("%16s %6s %10s %9s %6s %6s %10s %6sn",
"Customer", "Outs", "NumCust", "NoPower", "AvgMin",
"AvgHrs", "TotHrs", "Pct");
When printing the values for AvgHrs use %6.2lf, for TotHrs use
%10.2lf, and for Pct use %6.2lf.
After all company data has been read, calculated and printed,
then some overall information and the final three total pieces of
information (4 – 6) should be printed out as follows:
The total number of electricity provider companies was : XX
The total number of outages for these XX companies was : YY
The total number of customers who lost power for those XX
companies was : ZZ
9. The percentage of customers who lost power for those XX
companies was: AA
The average hours without electricity per customer for those XX
companies was: BB
Where the values of XX, YY, ZZ, AA, and BB are:
XX is the number of companies listed in the input file.
YY is the sum of the number of outages for all companies in the
file.
ZZ is 4) from above, the sum of the total number of customers
who lost power for all companies in the file.
AA is 5), percentage of customers who lost power for all
companies combined.
BB is 6), average hours without electricity per customer for all
companies combined.
1.a) Write the pseudocode for all the steps needed to implement
this program. Remember that you can put the steps into any
order that will correctly solve the problem – you do not have
the do them in exactly the way they are listed in the problem as
long as the order of the output meets the requirements. You
may also need some calculations that are not explicitly
mentioned but that are required in order to accomplish the task,
e.g. what data is needed in order to find the percentage of
customers who lost power for all the companies combined and
how to do you get that data? {10 pts}
Rubric:
Assessing
10 pts per line max
Exceeds Expectations
10 pts
Meets Expectations
7 - 9 pts
Needs Improvement
5 - 6 pts
Needs Substantial Work 0 – 4 pts
10. Pts
Pts
*
Wt
Complete-ness {10%}
[weighting = 1}
All steps of the program are accounted for including creation of
variables and storing final calculation
Most steps of the program are accounted for including creation
of some variables and storing final calculation
Some steps of the program are accounted for. Few variables are
created and/or final calculation is not stored
Few steps of the program are accounted for. Variables and/or
final calculation missing
Clarity
{8%}
[weighting = .8}
Written description of algorithm is clear and easy to interpret
into code in a step by step fashion
Written description of algorithm is mostly clear. Most steps are
easy to interpret into code
Written description of algorithm is unclear. Some steps can be
interpreted into code
Written description of algorithm is not clear. Few steps can be
turned into code
Correctness
{12%}
[weighting = 1.2}
Each step of the algorithm is mathematically correct. Overall
formula is correct.
Most steps of algorithm are mathematically correct. Overall
formula is mainly correct.
11. Some steps of algorithm are mathematically incorrect. Overall
formula is close but not correct.
Most steps of algorithm are mathematically incorrect. Overall
formula is not correct.
Weighted Rubric Total out of 30 points possible
Final score is (Weighted Rubric Total) / 3 to get a score out of
10 points
1.b) Write a C program named XYZ1234Lab4Part1b.c that
implements the program you pseudocoded in part 1.a). {20 pts}
Using the pseudocode for the algorithm,
1) Create a new C project with the program header block
defined above,
2) In main, create a code framework with comments from
pseudocode, then
3) Inside the framework, write code with additional explanatory
comments to
a) Get user input for variable values with a meaningful message,
b) Implement the correct formula using the steps given in the
pseudocode, and
c) Produce correct output in a meaningful statement,
Requirements:
i) Test, execute, and debug the program with at least three
different sets of input
ii) Use good formatting
iii) Use only elements discussed in class by the time the lab is
due
iv) Use meaningful variable names (names from formula are OK
to use)
v) Do not use shortcut operators
vi) Write all your code yourself (but you may get debugging
12. help from others)
Rubric with coding checklist:
Checklist is completed by the student to record that the element
is addressed.
Grading by TA/instructor will assess checkmarks against
submitted code to assign points
Code contents and formatting {6 points total}
My C code has the standard class header block comment with :
assignment name, OnlineGDB login name, date, my UTA
name, and my UTA ID
My C code uses my pseudocode as framework comments for the
program
My code stores the user/file input values into appropriate
variables to use
My program implements the steps of the pseudocode as C
statements or blocks
The steps of my program use the user's/file input values to
execute the formula
The final value of the formula/calculation is stored in a varia ble
before output
I used consistent formatting of braces, indentation, and blank
lines
I used meaningful variables names appropriate to the problem
being solved
Code correctness, completion, and clarity {11 points total}
My code asks the user for appropriate input values or uses the
correct file input
My code accepts input from the user or file for the needed
values
The steps of my program correctly implement the
formula/calculations
The formula/calculation value is printed in a meaningful output
message to the user
The final value of the formula/calculation output by the
program is correct
My code runs without any errors or warnings
13. My code is well-structured, understandable, and straightforward
I did not use shortcut operators (ex. ++, *=)
Coding activity {3 pts total}
I wrote my formula pseudocode myself
I wrote all of my C code myself
I tested my C code with at least three different sets of values
I debugged my code myself and/or I got help from Dr. T, the
TAs, my peers, or others
I only used concepts already discussed in the class lectures
prior to this due date
Total Part 1.b)
1.c) Screenshots: Using your C code, execute your code with
the input values below and show a screenshot of each set of
output (one screenshot for each set of input values). Put each
input data group into its own file and use that file for input.
{Each screenshot is worth 3 points; 15 pts total}
Five short input data files with the data below.
Input data group 1:
Offcore 3456 1098762 114572 497
YellowValley 20 100000 5000 60
UYVEnergy 10 20000 200 10080
SWP&L 0 245987 0 0
RF&D 154 359024 45340 180
Input data group 2:
UnreliantEnergy 1000 223987 94234 2764
PoorOfTexas 251 34726 4434 502
PogostickEnergyLLC 31 7564 2876 612
PaymorePower 12 6502 6498 2160
OctopusEnergy 100 22003 2020 7233
Input data group 3:
SuperNovaElectricCo 34 13400 10876 5762
14. DeadLeafEnergy 11 7835 954 4441
MyQuestionEnergy 2984 992345 873234 248
LonelySparkleEnergy 23 10943 1354 5897
IberdrolaPotionsLLC 10 35087 7432 127
Input data group 4:
LumiereEnergyLLC 904 3267882 763532 1578
GexaLethargy 45 100435 98342 4320
ExpensivepointEnergy
Solution
sLLC 87 23667 6978 123
EnergyMonsterLLC 231 92456 52865 877
Dynosaurwatt 63 345612 296134 500
Input data group 5:
ConstellationNoenergyInc 63 98732 83452 634
DimBulbUSLLC 1928 349876 317635 2340
EnemigoEnergy 84 29765 24976 478
NoTexPower&Light 756 908734 745234 1675
EntropyEnergy 102 53423 4329 2564
Part 2: Modify some code and add functionality with arrays and
functions
For this part of the lab assignment you are going to use the code
15. you created for Part 1 and modify it to do more tasks. In this
lab you will also be writing some different functions and then
calling those functions to perform tasks. This code will
continue read in data from an input file that you will create but
now the data will be stored in arrays.
2.a) In Part 1 you implemented a program to process some data
regarding electricity providers. You used single variables to do
this work and did not save all of the input data into the
program. For this part of the lab, you are now going to save all
of the input data into arrays and then use the data in the arrays
to do additional tasks.
For Part 2.a) you will be creating three multidimensional arrays
to hold the data from the companies. You will put the input
data into the arrays as well as the data that is calculated for
each company. The three arrays will be compNames, compInts,
and compDoubs defined as:
1. compNames - An array of 25 rows of strings, with a max of
40 chars, to hold the company names
2. compInts - An array of 25 rows and 5 columns to hold the
integer data items including:
· outages = Number of outages for that company
· customers = Total number of customers of that company
16. · noPowerCnt = Number of customers without power for any
unplanned length of time
· avgNoPowerMin = Average length in minutes of an unplanned
power outage
· totNoPowerHrs = total accrued hours without electricity for
each company – 2) above
3. compDoubs - An array of 25 rows and 2 columns to hold the
floating point data items including:
· avgNoPowerHrs = average hours without electricity per
customer for each company – 1)
· pctNoPowerCust = percentage of customers who lost power
for each company – 3)
After creating the arrays, your program should read in the data
from the file as before and store each data item into the arrays.
All data on the same row in the file should go on the same row
in each array. The values that are calculated for each company,
totNoPowerHrs, avgNoPowerHrs, and pctNoPowerCust, should
be calculated after each line is read and stored in the arrays on
the same row as the data used to calculate these values. The
three calculations done for all companies should NOT be done
as in Part 1 while the data is read in. Also in Part 2, you should
NOT print the data table as it is read in – you should only read,
store, and calculate.
After all the data in the file is read, then call a function, named
17. printElectricityProviders, to print the data table. You should
pass in the three arrays to this function. The table should look
like the table from Part 1.
After the data table is printed, then call a function, named
totProviderData, that will calculate and print the three overall
company values (same as Part 1), i.e.
4) total customers who lost power for all companies combined,
5) percentage of customers who lost power for all companies
combined, and
6) average hours without electricity per customer for all
companies combined.
Make sure that all output data is labeled so that a user would
know what is represented by each set of data shown in the
output. Make sure that your program runs completely without
errors and the correct output is produced. Once your program is
working correctly, save your working program as
XYZ1234Lab4Part2a.c. [Don’t forget to put a note in your
answer file for this question reminding the grader to look for
the .c file]{20 points}
Rubric:
Correctly declare required arrays with correct sizes and data
types {3 pt}
Correctly read the input values from file and store into array
variables {3 pt}
18. Correctly calculate electricity provider values: totNoPowerHrs,
avgNoPowerHrs, pctNoPowerCust and store into arrays
correctly {3 pts}
Correctly create the printElectricityProviders function with
correct parameters and content {2 pt}
Correctly create the totProviderData function with correct
parameters and content {2 pt}
Correctly calculate values in the totProviderData function {3
pt}
Correctly call printElectricityProviders and totProviderData
functions with correct parameters. {4 pts}
2.b) Screenshots: Using your C code, execute your code with
the input values as described below and show a screenshot of
each set of output (one screenshot for each set of input values).
{Each screenshot is worth 3 points; 6 pts total}
Test file 1: Create arrayTestFile1.txt that contains Input data
groups 3, 2, and 1 all together, with each grouping remaining in
the same order they are given. Include only the lines of data
from the three groups and do not include any blank lines.
Test file 2: Create arrayTestFile2.txt that contains Input data
groups 4 and 5 all together in the same order they are given
2.c) Write two functions to search the company names array.
Both functions should accept the compNames array as their
19. input. One function, findFirst, should find the "first" company
name in alphabetical (lexicographical) order and return the row
index for the name and the second function, findLast, should
find the "last" company name in alphabetical (lexicographical)
order and return its index. You'll need to look through the
compNames array, use a string compare function, and keep
track of the "first" (or "last") name and its location as you go
through the array. You should ignore any capitalization of
names in your comparison, i.e. compare all strings as lowercase
letters only. In the main routine, call findFirst, and then print
the company name that was found in a message that explains
why that name is printed. Next, call findLast, and then print the
company name that was found in a message.
Make sure that all output data is labeled so that a user would
know what is represented by each set of data shown in the
output. Make sure that your program runs completely without
errors and the correct output is produced. Once your program is
working correctly, save your working program as
XYZ1234Lab4Part2c.c. [Don’t forget to put a note in your
answer file for this question reminding the grader to look for
the .c file]{12 points}
Rubric:
Correctly create the findFirst function with correct parameters
and content {2 pt}
Correctly design and implement the search logic for findFirst to
20. get the correct result {3 pt}
Correctly create the findLast function with correct parameters
and content {1 pt}
Correctly design and implement the search logic forfindLast to
get the correct result {2 pt}
Correctly call findFirst and findLast functions with correct
parameters. {2 pts}
Correctly print results from findFirst and findLast functions {2
pts}
2.d) Screenshot: Using your C code from 2.c) , execute your
code with the Test file 1 input values from 2.b) and show a
screenshot of the output { Screenshot is worth 2 points}
Part 3: Add more functionality with arrays and functions
3.a) Write a function, called companyStats, that takes in the
compNames, compInts and compDoubs arrays and then prints
out the following information:
1) The company name, number of total customers, noPowerCnt,
and pctNoPowerCust for the company with the highest
percentage of customers who lost power. This should be in a
sentence like the following. (The data below is not the
company with the highest percentage.)
"EntropyEnergy, with 53423 customers, had 4329 without
21. power or 8% of its customers."
2) The company name, number of outages, and avgNoPowerHrs
for the company with the shortest average time without power.
Print this information in a sentence.
3) The company name, number of total customers, and
noPowerCnt for the company with the largest sheer number of
customers without power. Print this information in a sentence.
Call the function companyStats at the end of the main routine.
Make sure that all output data is labeled so that a user would
know what is represented by each set of data shown in the
output. Make sure that your program runs completely without
errors and the correct output is produced. Once your program is
working correctly, save your working program as
XYZ1234Lab4Part3a.c. [Don’t forget to put a note in your
answer file for this question reminding the grader to look for
the .c file]{13 points}
Rubric:
Correctly create the companyStats function with correct
parameters and content {2 pts}
Correctly design and implement the search logic for
companyStats to get the correct result for:
highest percentage of customers who lost power {2 pts}
shortest average time without power {2 pts}
largest sheer number of customers without power {2 pts}
Correctly print output as specified in the instructions for the
22. three results above {3 pts}
Correctly call companyStats functions with correct parameters.
{2 pts}
3.b) Screenshot: Using your C code from 3.a), execute your
code with the Test file 1 input values from 2.b) and show a
screenshot of the output { Screenshot is worth 2 points}
---------------------------------------------------------------------------
-----------------------------
Suggestions to help you be successful
A. Pay close attention to all requirements on this page,
including file names and submission format. Even in cases
where the program works correctly, points will be taken off for
not following the instructions given on this page (such as wrong
file names, wrong compression format for the submitted code,
and so on). The reason is that non-compliance with the
instructions makes the grading process significantly (and
unnecessarily) more time consuming. Contact the instructor or
TA if you have any questions.
B. For each new question that requires you to write code, make
a new C project with the exact name that you need to use.
Double check that there are no errors before submission. In
23. case of an error in this situation, 0 points will be awarded.
C. Write your code in small steps. Do NOT try to write 25 lines
of code and then start trying to run it. Instead, write a small
chunk of code - 5 to 10 lines - then save and run those 10 lines
to make sure they work and then continue. If the 5 to 10 lines
have any errors, start on the errors closest to the top of the file
and fix those first. Once you have made changes to fix ONE
error, then run the code again to see if that really did fix the
error. Don’t go forward until you have fixed to topmost error.
If you can’t figure out how to fix that one – try to comment out
the line with the error and then fix the remaining errors in your
chunk. Don’t go further until you have fixed what you have so
far.
D. If you are working on a project and want to start completely
over (which is not always the best idea), copy the “old code”
that you do not plan to reuse and save it into a text file in a
directory with your other materials for the class. You may
discover that you do want to reuse that code and if you have
saved it, then you won’t have to rewrite all of it.
Instructions about preparing your lab to turn in:
How to prepare your assignment to turn in (or to "submit")
24. Create a folder for your lab in your CSE 1310 class directory on
YOUR computer and name the lab folder with your initials,
your last 4 digits, and LabX. [If you don’t have your files
organized into folders, I STRONGLY suggest that you start
doing this. This is a way to sort the material you keep on your
computer and be able to find it later. Check the internet for
suggestions on how to do this type of organization.)
As an example, if your name is Happy Camper 1010101010,
then your Lab 1 folder name is HXC1010Lab1. Save your
HXC1010Lab1answers file in this folder. Next save all the .c
files from OnlineGDB for the assignment in the folder. Below
is how to do that. Once you have put all the needed .c files in
your folder, zip the folder to compress it before submitting it
(see info further down with submission details).
Saving .c files out of the IDE (OnlineGDB) [There are two
different ways to save the .c files]
First method – downloading the Project file and then unzipping
the files from the project folder
To download your C code from OnlineGDB you should go to
My Projects and then, for the project you need to download, use
the download button under the Actions label. When you click
the button, you'll get a typical download window. Save the .zip
file that is downloaded into the folder that you plan to submit
25. and name the project folder something useful so you remember
what it is. Once the file is downloaded, it will be a zipped
(compressed) file like LabX.zip . Once it is in your directory,
click on it and UNZIP the file contents. You may need to select
how to uncompress the files from the .zip archive. After you
unzip the file, you should see the .zip file and the contents that
have been uncompressed. You need to keep the .c files that are
unzipped (and any text files that might have been created or
used) and you need to delete the zip file that was downloaded
from OnlineGDB. Rename the main.c file to the appropriate
name for the lab part you are working on and then delete the
.zip file.
Second method – downloading the files one by one from
OnlineGDB
Go to the Project (the program) in OnlineGDB that you want to
save and open it. Make sure the program is open in the main
window and is the program you are looking at. For example, if
you are saving the main.c file for Lab1Part5 you will see the
main.c file will say Lab1Part5 in the comments. Make sure
your cursor clicks in the editing window of that file. Along the
top of the editing window you will see a light blue download
arrow. Click the arrow to download just the code in the window
you are looking at. For programs that only have one main.c file
(and no other text files) this method works fine. Save the .c file
26. into the folder that you plan to submit and name the .c file to
the appropriate name for the lab part you are working on. Don't
forget to save the .c file in OnlineGDB into your My Projects
directory so you can reuse it later if needed.
Reopening projects: If you have closed a project in OnlineGDB
and want to go back to it to edit it some more, you can go to the
project by going to the My Projects link on the left menu of the
window. Then select the folder of the project you want. Open
the folder and then select the name of the main.c or other source
file you want, then click on the that file. This will open the
program again in the editing window for you to keep working
on.
C FILE NOTE: Only the .c files, the answers file, and any input
or output files that you create should be included in your zipped
folder. Do NOT include the entire OnlineGDB project. You
will be penalized if you save the project instead of just the .c
files and the input and output files.
Because C names all of the main files as main.c, you will need
to RENAME each .c file to the correct file name as noted in the
instructions for each question. Thus, if you are turning in Lab
3 with two parts that both have one .c file, then you should have
a XYZ1234Lab3 folder and inside that folder you should have
files for Parts 1 and 2, i.e. a XYZ1234Lab3Part1.c, a answers
27. document, and a XYZ1234Lab1Part2.c file.
How to submit [Same as Lab 2]
The assignment should be submitted via Canvas. Submit a
ZIPPED directory/folder called XYZ1234Lab1.zip. The file
must be ZIPped (not RAR). No other forms of compression
accepted. (Contact the instructor or TA if you do not know how
to produce .zip files). The zipped directory should contain your
answers document and all the C code files (task1.c etc).
To create a zipped directory called XYZ1234Lab1.zip, follow
these steps:
1.Create a folder called XYZ1234Lab1. {This should be the
same folder you created already that has your files in it.)
2.If not already done, copy to that folder all your solutions
(your answers file, all your C files, and any .txt files that were
required for input or output).
3.Zip that folder. On some Windows systems, you can zip a
folder by right-clicking on the folder, and then selecting Send
to->Compressed (zipped) folder. On Mac, go to the parent
directory of your Lab# directory in a Finder window, click on
your XYZ1234Lab# folder, then select Compress from the list
of file actions (under the gear icon).
4.Submit your zipped folder through your Canvas account at the
lab assignment. You click on the name of the assignment and
then it goes to the screen where you can upload your zipped
28. file. (Assignments are only accepted through Canvas.)
5.Check that what you uploaded is exactly what you want by
going into Canvas and then downloading the assignment you
just uploaded, unzipping the folder, and checking the contents
to make sure that everything you want to be there is present.
Submission checklist
•Did you correctly name all the lab submission elements –
answer document, .c files, the folder, etc?
•Did you create one answers file with your name and UTA ID in
the file, and did you include all your answers to non-
programming tasks and references to the code files as needed?
· Did you include all the needed screenshots for output making
sure that each screenshot was large enough to be read but small
enough to keep the answers document from becoming huge?
•Did you answer all of the questions in the lab assignment and
did you create all the required .c program files and text files, if
any?
· Do all your .c program files run without errors in OnlineGDB?
· Do all your .c program files run and give correct answers in
OnlineGDB?
•Did you put all of the files you created into one folder called
XYZ1234Lab# ?
•Did you zip that folder into a file called XYZ1234Lab#.zip?
•Did you upload the zipped file to Canvas before the due date
29. and time?
· Did you check what you uploaded to Canvas to make sure it
has the desired material in it?