I concur, technology is so engrained in our day-to-day activities (work, family, friends, etc.) that
we cannot do without it. What does it mean for us? What does it mean for business that are
trying to sell us services and items?.
help
help
Regarding the numerous bond and interest rate terminologies (e.g., premium/discount bond,
market/fair price, spot rates, YTM, term structure, etc.), which statements are INCORRECT?
Check all that apply: Treasury notes (T-notes) have maturities between 1 and 10 years. Term
structure of interest rates can have many shapes, but usually stays flat. A zero-coupon bond can
be either a premium bond or a discount bond depending on its market price. Treasury bonds ( T-
bonds) have maturities between 10 and 50 years..
Hello. Im having trouble trying to set the condition where once the .pdfpratyushraj61
Hello. Im having trouble trying to set the condition where once the user enters "." there won't be
anymore user input and the program stops and displays the number of vowels entered by the user
but it's not recognising the "while" condition and the program keeps going..
Henrich is a single taxpayer. In 2022, his taxable income is $478,0.pdfpratyushraj61
Henrich is a single taxpayer. In 2022, his taxable income is $478,000. His $478,000 of
taxable income includes $55,000 of long-term capital gain that is taxed at preferential rates.
What is his tax liability (including the net investment income tax)?.
Hi could you focus on the isohyetal method and thiessen polygon me.pdfpratyushraj61
Hi could you focus on the isohyetal method and thiessen polygon method.
please provide the detailed on how you divide the area in each method and the detailed
calculation.
Thank You. I WILL IMMEDIATELY GIVES YOU A THUMBS UP. calculate the mean areal
precipitation of the below projected area using arithmetic mean method, isohyethal method, and
Thiessen method..
helpppppp((( The difference between an embedded object and a linked.pdfpratyushraj61
helpppppp:((( The difference between an embedded object and a linked object is that a linked
object will automatically be updated whenever its original is changed. Note: Clicking any button
other than the Save Answer button will NOT save any changes to your answers!.
help on this thanks. Phalaropes are shore birds with brightly col.pdfpratyushraj61
help on this thanks. Phalaropes are shore birds with brightly colored females and dull colored
males. Females are larger than males and compete with each other for access to males.
Considering sexual selection theory, which idea(s) below seem(s) most plausible in light of the
pattern of sexual dimorphism? a) Females incubate eggs and care for the young. b) Males are
choosy. C) Males incubate eggs and care for the young. d) b and c.
I have an independent food delivery platform having a lot of differe.pdfpratyushraj61
I have an independent food delivery platform having a lot of different restaurants. But I don't
have a delivery service and I want to use Grubhub Delivery API integration allowing GrubHub
to do my deliveries only.
Kindly provide me complete details of how I can do that through their developer portal.
How can I get access to my credentials to use Delivery API? What specific API would be used
for this purpose?.
i need programingi need programing ai. Create o Va opplication t.pdfpratyushraj61
i need programing
i need programing ai. Create o Va opplication to generate the old and even numbers as shown in
the figure 1 . The application should generate odd and even numbers in seporate list boxes when
"Odd/Even" button is clicted. Note: 2 tuen numbers are devisable by 2 and leoves 0 as
remainder, 6,g.2,4,6,8,,12,... Odd numbers, when divided by 2 , leave a remainder of 1 . .. 1,
3,5,7,.
help
help
Regarding the numerous bond and interest rate terminologies (e.g., premium/discount bond,
market/fair price, spot rates, YTM, term structure, etc.), which statements are INCORRECT?
Check all that apply: Treasury notes (T-notes) have maturities between 1 and 10 years. Term
structure of interest rates can have many shapes, but usually stays flat. A zero-coupon bond can
be either a premium bond or a discount bond depending on its market price. Treasury bonds ( T-
bonds) have maturities between 10 and 50 years..
Hello. Im having trouble trying to set the condition where once the .pdfpratyushraj61
Hello. Im having trouble trying to set the condition where once the user enters "." there won't be
anymore user input and the program stops and displays the number of vowels entered by the user
but it's not recognising the "while" condition and the program keeps going..
Henrich is a single taxpayer. In 2022, his taxable income is $478,0.pdfpratyushraj61
Henrich is a single taxpayer. In 2022, his taxable income is $478,000. His $478,000 of
taxable income includes $55,000 of long-term capital gain that is taxed at preferential rates.
What is his tax liability (including the net investment income tax)?.
Hi could you focus on the isohyetal method and thiessen polygon me.pdfpratyushraj61
Hi could you focus on the isohyetal method and thiessen polygon method.
please provide the detailed on how you divide the area in each method and the detailed
calculation.
Thank You. I WILL IMMEDIATELY GIVES YOU A THUMBS UP. calculate the mean areal
precipitation of the below projected area using arithmetic mean method, isohyethal method, and
Thiessen method..
helpppppp((( The difference between an embedded object and a linked.pdfpratyushraj61
helpppppp:((( The difference between an embedded object and a linked object is that a linked
object will automatically be updated whenever its original is changed. Note: Clicking any button
other than the Save Answer button will NOT save any changes to your answers!.
help on this thanks. Phalaropes are shore birds with brightly col.pdfpratyushraj61
help on this thanks. Phalaropes are shore birds with brightly colored females and dull colored
males. Females are larger than males and compete with each other for access to males.
Considering sexual selection theory, which idea(s) below seem(s) most plausible in light of the
pattern of sexual dimorphism? a) Females incubate eggs and care for the young. b) Males are
choosy. C) Males incubate eggs and care for the young. d) b and c.
I have an independent food delivery platform having a lot of differe.pdfpratyushraj61
I have an independent food delivery platform having a lot of different restaurants. But I don't
have a delivery service and I want to use Grubhub Delivery API integration allowing GrubHub
to do my deliveries only.
Kindly provide me complete details of how I can do that through their developer portal.
How can I get access to my credentials to use Delivery API? What specific API would be used
for this purpose?.
i need programingi need programing ai. Create o Va opplication t.pdfpratyushraj61
i need programing
i need programing ai. Create o Va opplication to generate the old and even numbers as shown in
the figure 1 . The application should generate odd and even numbers in seporate list boxes when
"Odd/Even" button is clicted. Note: 2 tuen numbers are devisable by 2 and leoves 0 as
remainder, 6,g.2,4,6,8,,12,... Odd numbers, when divided by 2 , leave a remainder of 1 . .. 1,
3,5,7,.
I need help with making a program that can be part of a google forms.pdfpratyushraj61
I need help with making a program that can be part of a google forms clone. I am at the part
where I need to enable the creation of different poll types on the creator's side. The styles are
public, anonymous, and private (only the creator can see the results).
In c++ or python if possible.
On the class diagrams it would fall between poll creation and poll options if that makes sense..
I need help fixing my assembly program please, I keep getting a segm.pdfpratyushraj61
I need help fixing my assembly program please, I keep getting a segmentation fault when
entering a name. I need entered name to be passed by reference to the subprogram where it put
into the greeting and printed out (please don't use chatgpt I tried it does not fix it) will upvote if
works
segment .data
mesg: db "Please enter your first name: ", 0
greeting: db "Hello, %s, welcome to Assembly World!", 10, 0
intInput: db "%s",0
segment .bss
name: resb 16
segment .text
global asm_main
extern printf, scanf
; Subprogram to print greeting
; Input: name (string)
print_greeting:
mov rdi, greeting
mov rsi, name
call printf
ret
asm_main:
enter 0,0
mov rdi, mesg
call printf
mov rdi, intInput
mov rsi, name
call scanf
; Call subprogram to print greeting
mov rsi, name
call print_greeting
mov rax, 0
leave
ret.
I need help getting my code to work (code is at the bottom)1.3.pdfpratyushraj61
I need help getting my code to work (code is at the bottom)
1.3. Overview
For this assignment you will be writing a program the asks the user to enter a decimal number
and stores it in IEEE 754 single-precision floating point representation. You will then parse the
IEEE 754 representation to extract the different pieces (sign, exponent, and significand)
You do not have to convert the input to IEEE 754 representation manually. Just use the syscall to
read a float. This will automatically store the value in IEEE 754 format for you. You can then
copy the value to a normal 32-bit register to perform the different bit manipulations to extract
each piece.
After the initial reading in of the floating point value and moving the value to a standard register
you should not use the floating point registers again. Do not use any of the floating point
operations to find the sign, or anything else.
All of the parsing and calculations should be done using various bit manipulations operations
(i.e. bitshifts, maskings, etc). Remember beyond the initial reading of the floating point value
and moving it to a standard register your program should not touch the floating point registers
again.
Your program does not need to handle any of the special cases of floating point numbers like
NaN, infinity, -infinity, 0 or -0.
1.4. Task 1: Main Procedure
Your first task is to collect is to create a loop for your program. Ask user to enter "Do you want
to do it again?" in a Dialog box. Hint: Use syscall 50. If the user answers YES repeat the process.
NO or Cancel, exit the program.
1.5. Task 2: Take User Input Procedure
void read_float()
Next, take user input and store it in memory. Prompt the user to enter a floating point value as a
decimal number. Then, store the input value in a single precision floating point register. In a
DialogBox (syscall 52), Display a string with info about the program ex: "Welcome to the " and
capture a user input. The input should be a floating point number.
You MUST store input into memory space (ieee). To do this, first move your captured input
from the f0 floating point register to a regular temporary register using the following call:
Now, you should be able to store the value into the ieee variable in memory.
The procedure should have the following signature:
1.6. Task 3: Print the sign
void print_sign(ieee)
Your next task is to create a procedure called print_sign that will extract and interpret the sign bit
of the IEEE 754 single precision floating point number. The floating point number is the value
you collected from Task 2.
Your function will take the value as a 32-bit number in a non-floating point register (i.e. $a0).
Remember, this value is stored in your ieee memory space. You should use bit manipulations
(i.e. shifting, masking, etc) to determine the value of the sign bit. If the sign bit is a 1 your
function should print the '-' character. If it is a 0 your function should print the '+' character.
The procedure should have the.
Hewitt Packaging Company'nin denmemi %14 kupon faiz oranyla 1.000 ABD Dolar deerinde
tahvil ihra etmesi var. hra alt ayda bir faiz demeli olup, vadesine 10 yl kalmtr. Benzer riskteki
tahviller u anda yzde 12'lik bir getiri oranyla vadeye kadar satlyor. Bu Hewitt Packaging
Company tahvillerinin deeri nedir?
sorunun cevabn kelimelerle ve matematikle aklayn..
I need an explanation on what the function of the number 1.428 in .pdfpratyushraj61
I need an explanation on what the function of the number "1.428" in the following code, could
you explain it please? I have provided the code below
from PIL import Image
def fix_middle(picture):
# Swapping the red and green components in the middle of the picture
# The middle is defined as a rectangular space
# 100% of the picture height and
# 50% of the picture width centered horizontally.
width, height = picture.size
for x in range(width):
for y in range(height):
if x in range(int(width/4),int(width/4)+int(width/2)) and y in range(height):
r,g,b = picture.getpixel((x,y))
picture.putpixel((x,y),(g,r,b))
return picture
def fix_top_half(picture):
# Changing each pure yellow pixel on the top half of the image to white
# Pure yellow pixels have the red and green components maximized and the blue component
minimized
width, height = picture.size
for x in range(width):
for y in range(height):
if x in range(width) and y in range(int(height/2)):
r,g,b = picture.getpixel((x,y))
if r == 255 and g == 255 and b == 0:
picture.putpixel((x,y),(255,255,255))
return picture
def make_rect_varyh(picture):
# Rectangle upper left corner: (10% of the picture width, 70% of the picture height)
# Rectangle height: 5% of the picture height
# Rectangle width: 80% of the picture width
# Rectangle color varies from black to pure blue as the rectangle is traversed horizontally
from left to right
width, height = picture.size
for x in range(width):
for y in range(height):
if x in range(int(width/10),int(width/10)+int(width/1.25)) and y in
range(int(height/1.428),int(height/1.428)+int(height/20)):
r,g,b = picture.getpixel((x,y))
picture.putpixel((x,y),(0,0,int((x-int(width/10))/(width/1.25)*255)))
return picture
from PIL import Image
def fix_file(file_name):
# Open the file_name indicated to obtain a picture
# Call the helper functions: fox middle (picture) fix top_half (picture) make_rect_varyh
(picture)
# Show only the final picture to verify the changes
# Save the final picture as "final.png"
picture = Image.open("stop_colored.png")
picture = fix_middle(picture)
picture = fix_top_half(picture)
picture = make_rect_varyh(picture)
picture.show()
picture.save("final.png")
fix_file("stop_colored.png").
I need help coming up with a MIPS program for this.1.3. Overvi.pdfpratyushraj61
I need help coming up with a MIPS program for this.
1.3. Overview
For this assignment you will be writing a program the asks the user to enter a decimal number
and stores it in IEEE 754 single-precision floating point representation. You will then parse the
IEEE 754 representation to extract the different pieces (sign, exponent, and significand)
You do not have to convert the input to IEEE 754 representation manually. Just use the syscall to
read a float. This will automatically store the value in IEEE 754 format for you. You can then
copy the value to a normal 32-bit register to perform the different bit manipulations to extract
each piece.
After the initial reading in of the floating point value and moving the value to a standard register
you should not use the floating point registers again. Do not use any of the floating point
operations to find the sign, or anything else.
All of the parsing and calculations should be done using various bit manipulations operations
(i.e. bitshifts, maskings, etc). Remember beyond the initial reading of the floating point value
and moving it to a standard register your program should not touch the floating point registers
again.
Your program does not need to handle any of the special cases of floating point numbers like
NaN, infinity, -infinity, 0 or -0.
1.4. Task 1: Main Procedure
Your first task is to collect is to create a loop for your program. Ask user to enter "Do you want
to do it again?" in a Dialog box. Hint: Use syscall 50. If the user answers YES repeat the process.
NO or Cancel, exit the program.
1.5. Task 2: Take User Input Procedure
void read_float()
Next, take user input and store it in memory. Prompt the user to enter a floating point value as a
decimal number. Then, store the input value in a single precision floating point register. In a
DialogBox (syscall 52), Display a string with info about the program ex: "Welcome to the " and
capture a user input. The input should be a floating point number.
You MUST store input into memory space (ieee). To do this, first move your captured input
from the f0 floating point register to a regular temporary register using the following call:
Now, you should be able to store the value into the ieee variable in memory.
The procedure should have the following signature:
1.6. Task 3: Print the sign
void print_sign(ieee)
Your next task is to create a procedure called print_sign that will extract and interpret the sign bit
of the IEEE 754 single precision floating point number. The floating point number is the value
you collected from Task 2.
Your function will take the value as a 32-bit number in a non-floating point register (i.e. $a0).
Remember, this value is stored in your ieee memory space. You should use bit manipulations
(i.e. shifting, masking, etc) to determine the value of the sign bit. If the sign bit is a 1 your
function should print the '-' character. If it is a 0 your function should print the '+' character.
The procedure should have the followi.
I need help being able to enable different voting types such as publ.pdfpratyushraj61
I need help being able to enable different voting types such as public, anonymous, and private
(only the creator of the poll can view) for a type of google forms clone program. In c++ or
python if possible..
How do zoned reserves manage relations with local people1. Zone.pdfpratyushraj61
How do zoned reserves manage relations with local people?
1. Zoned reserves allow local people to remain culturally engaged with a protected area by
allowing them to continue traditional use of a limited portion
2. Zoned reserves follow the preservationist ethic and set aside their entire territory as wilderness
areas, with no consumptive use by local people allowed.
3. Zoned reserves do not exclude local people, allowing traditional land use in all portions of
protected areas.
4. Zoned reserves exclude local people from all portions of protected areas with large numbers of
enforcement personnel..
I have included the person.h file code. 1-4 In a file called functio.pdfpratyushraj61
I have included the person.h file code. 1-4 In a file called function-1-4.cpp, include Person.h and
write a function called that takes a PersonList struct and returns a new PersonList struct that is a
shallow copy of the original. That is, the people field of the new struct should point to the same
array of n Person structs as the original. Implement a program with a main method that tests your
code in a file called main-1-4.cpp..
Here is my code for a linefile editor import java.io.BufferedRea.pdfpratyushraj61
Here is my code for a line/file editor:
import java.io.BufferedReader;
import java.io.File;
import java.io.FileReader;
import java.io.IOException;
import java.util.ArrayList;
import java.util.List;
import java.util.Scanner;
public class FileEdit {
public static List lines = new ArrayList();
public static void main(String[] args) throws IOException
{
Scanner s = new Scanner(System.in);
System.out.print("EDIT: ");
String fileName = s.nextLine();
BufferedReader br = new BufferedReader(new FileReader(new File(fileName)));
String str="";
int count=0;
while((str=br.readLine())!=null)
{
lines.add(count, str);
System.out.println((++count) + "> "+ str);
}
String text="";
String command = "";
System.out.print((++count)+"> ");
command=s.nextLine();
String commandArr[];
int flag;
while(!command.equals("E"))
{
flag=0;
commandArr = command.split("\\s");
if(commandArr[0].equals("I")) //Insertion
{
while(true)
{
if(commandArr.length==1&&flag!=2)
{
System.out.print((count)+"> ");
text = s.nextLine();
insertLine(text,count-1);
}
else if(commandArr.length==2&&flag!=2)
{
System.out.print((commandArr[1])+"> ");
count=Integer.parseInt(commandArr[1]);
text = s.nextLine();
insertLine(text,Integer.parseInt(commandArr[1])-1);
}
else
insertLine(text,count-1);
System.out.print((++count)+"> ");
command=s.nextLine();
commandArr = command.split("\\s");
if(commandArr[0].equals("I")||commandArr[0].equals("L")||commandArr[0].equals("D")||comm
andArr[0].equals("E"))
{
flag=1;
break;
}
else
{
flag=2;
text=command;
}
}
}
else if(commandArr[0].equals("L")) //Listing
{
printList();
}
else if(commandArr[0].equals("D")) //Deletion
{
if(commandArr.length==1)
{
deleteLine(count-1,count-1);
}
else if(commandArr.length==2)
{
deleteLine(Integer.parseInt(commandArr[1])-1,Integer.parseInt(commandArr[1])-1);
}
else if(commandArr.length==3)
{
deleteLine(Integer.parseInt(commandArr[1])-1,Integer.parseInt(commandArr[2])-1);
}
count=lines.size();
}
if(flag!=1)
{
System.out.print((count++)+"> ");
command = s.nextLine();
}
}
}
public static void insertLine(String text,int count)
{
if (count >= lines.size()) {
for(int i = lines.size(); i <= count; i++) {
lines.add(null);
}
}
lines.set(count,text);
}
public static void deleteLine(int start,int end)
{
for(int i=start;i<=end;i++)
lines.remove(i);
}
public static void printList()
{
for(int i=0;i "+lines.get(i));
}
}
Here is my output:
EDIT: textin.txt
1> The First Line
1>
2> And another line
3> I 3
3> The second line
4> One more line
5> L
1> null
2> null
3> The second line
4> One more line
5> D 2
3> L
1> null
2> The second line
3> One more line
4> E
How can I keep it from printing "null" after ">" and it just be blank. I need the output to look like
this:
1> The first line
2>
3> And another line
4> I 3
3> The second line
4> One more line
5> L
1> The first line
2>
3> The second line
4> One more line
5> And another line
5> D 2
4> L
1> The first line
2> The second line
3> One more line
4> And another line
5> E.
I have a question regarding extreme value analysis.I fitted a gene.pdfpratyushraj61
I have a question regarding extreme value analysis.
I fitted a generalized extreme distribution to my track records data using get.fit.
I tried to use stationary, linear, quadratic models, and for the stationary model, the MLE would
be written as
but how can I write MLEs as a vector for the linear and quadratic models?.
I am wondering if i can implement these use cases to make a google f.pdfpratyushraj61
I am wondering if i can implement these use cases to make a google forms type of program using
c++ or python?
1. Use case: GUI login
Primary actor: User
Goal: To give the user the ability to log in/sign up to an account
Preconditions: System needs to get input of username and password to store in the correct
variables
Trigger: By clicking confirm after entering a username and password
Scenario:
- User arrives at web application home page
- User enters username and password
- User presses confirm
- System stores username and password
Exceptions:
- Username is already in use: User enters an unused username
- Password/Username is empty: User checks both username and password are filled in
Priority: Essential
When available: First iteration
Frequency of use: Whenever the user wants to log in
Channel to actor: via login interface
Open issues:
- What if the username is already used?
- What if the user forgets their username/password?
2. Use case: Profile Information
Primary actor: User
Goal: Store information about the user that can be used to invite users based on criteria entered
Preconditions: System needs to be able to recognize the variables inputted and store them
correctly an associate it with the correct login credentials
Trigger: User confirms the entered information provided
Scenario:
- User is sent to profile interface after creating an account
- User enters information in the indicated fields
- User presses confirm
- System stores the provided information from user
Exceptions:
- Any empty fields present: User checks that all fields are filled in
- Information is incorrect for the field: User enters in correct option for the field
Priority: Essential
When available: First iteration
Frequency of use: Once for each user during creation of account; possibly whenever the user
desires after creation
Channel to actor: via profile interface
Open issues:
- Will an error message pop up if the user does not enter information on one of the fields?
- What if the user does not want to enter any profile information?
- Will there be a minimum requirement of information to enter for all users?
3. Use case: Error message for login interface
Primary actor: System
Goal: A message to notify the user they entered the incorrect login information
Preconditions: System needs to recognize the login credentials matches one the profiles within
the library/list stored in the system
Trigger: The username/ password entered by the user doesnt match any profile login credentials
stored within the system.
Scenario:
- User arrives at login interface
- User enters login credentials
- Username or password is not recognized by the system
- Message pops up to notify the user incorrect username/password
- User reenters correct credentials
Exceptions:
- If one of the credentials is wrong: User still reenters both username and password
- User continues to enter incorrect credentials: Error message will still indicate that the
credentials are wrong until correct credentials are .
Hull Consultants, a famous think tank in the Midwest, has provided p.pdfpratyushraj61
Hull Consultants, a famous think tank in the Midwest, has provided probability estimates for the
four potential economic states for the coming year. The probability of a boom economy is %, the
probability of a stable growth economy is %, the probability of a stagnant economy is %, and the
probability of a recession is %. Estimate the expected returns on the following individual
investments for the coming year, LOADING....
What is the expected return of the stock investment? (Click on the following icon in order to
copy its contents into a spreadsheet.).
Hughes (2004) says, �large-scale complexity characterizes the post-W.pdfpratyushraj61
Hughes (2004) says, large-scale complexity characterizes the post-World War II era of
technological systems and distinguishes it from the preceding machine era. Because of this
complexity, the control, or management of technological systems becomes a major problem for
engineers and other expert professionals (p. 77). Electricity is one example of a technology
implemented in such a way as to become a large-scale technological system.
What is the significance of the move to large-scale technological systems?.
help please thanks 1. Match the statements below to the age .pdfpratyushraj61
help please thanks 1. Match the statements below to the age pyramid that they describe. High
fertility rate High life expectancy Typical of a developing nation, such as Ethiopia Typical of a
developed nation, such as Canada.
HU245 Unidad 2 Asignaci�nCuadro comparativo de teor�as �ticas.pdfpratyushraj61
HU245 Unidad 2 Asignacin
Cuadro comparativo de teoras ticas
Utilitarismo
Egosmo tico
tica del cuidado
Kantianismo
Deberes prima facie
Teora del Comando Divino
teora de la virtud
Cmo se determina el bien?
Filsofos ms destacados
Fortalezas principales
Principales debilidades
Utilitarismo
Egosmo tico
tica del cuidado
Kantianismo
Deberes prima facie
Teora del Comando Divino
teora de la virtud
Cmo se determina el bien?
Filsofos ms destacados
Fortalezas principales
Principales debilidades.
Html please do it step by step make sure mention which codes goes .pdfpratyushraj61
Html
please do it step by step make sure mention which codes goes to which file run it on r e p lit.
com
Use the following site to help you with this lab.
Have 5 buttons (or more) to make a music/sound effect machine. Have a series of buttons that
are labeled. They should play a sound when clicked.
Try to make a box or something that holds the buttons, so to looks like a sound machine. You are
welcomed to use an Image Map tool to place links on an image (of a sound machine) if you want
it to look more realistic. Here is how Images Maps work. Even use Cool Text to make fancy text
if you like.
Site for:
Music
Sound Effects.
hi, i answered just the a part... the rest, i need help with them .pdfpratyushraj61
hi, i answered just the "a" part... the rest, i need help with them pls. 7. Leber congenital
amaurosis (LCA) is a congenital blindness disorder, which can be caused due to mutations in any
of 14 genes. (a) One key gene is CRB1, which is involved in the development of the
photoreceptors in the eye. What cells have the CRB1 gene? Which cells do you think likely
express CRB1? (b) Shown is the untranslated region & start of the first exon of CRB1. Figure
out which strand is the coding strand and translate to determine the effect of the mutation..
htmlplease do it step by step mention code which it goes into. run.pdfpratyushraj61
html
please do it step by step mention code which it goes into. run it Rep LIT. com make sure it runs
the code
Using the WickEditor create a scene that consists of :
Make a moving scene where some objects move across the screen using Tweens on different
layers.
You should set the frame rate to 30 frames per second. Have 3 or more seconds worth of
animation. Ideally the scene should look well when repeated.
Suggestions:
Falling objects: like snow, rain, leaves
Vehicle, animals, objects or people moving on a road Balloons, rockets, other objects going up
into the sky
Export your project as an Animation, Video.
Then make a webpage that shows your animation.
But also upload the wick file so I can view your project code..
I need help with making a program that can be part of a google forms.pdfpratyushraj61
I need help with making a program that can be part of a google forms clone. I am at the part
where I need to enable the creation of different poll types on the creator's side. The styles are
public, anonymous, and private (only the creator can see the results).
In c++ or python if possible.
On the class diagrams it would fall between poll creation and poll options if that makes sense..
I need help fixing my assembly program please, I keep getting a segm.pdfpratyushraj61
I need help fixing my assembly program please, I keep getting a segmentation fault when
entering a name. I need entered name to be passed by reference to the subprogram where it put
into the greeting and printed out (please don't use chatgpt I tried it does not fix it) will upvote if
works
segment .data
mesg: db "Please enter your first name: ", 0
greeting: db "Hello, %s, welcome to Assembly World!", 10, 0
intInput: db "%s",0
segment .bss
name: resb 16
segment .text
global asm_main
extern printf, scanf
; Subprogram to print greeting
; Input: name (string)
print_greeting:
mov rdi, greeting
mov rsi, name
call printf
ret
asm_main:
enter 0,0
mov rdi, mesg
call printf
mov rdi, intInput
mov rsi, name
call scanf
; Call subprogram to print greeting
mov rsi, name
call print_greeting
mov rax, 0
leave
ret.
I need help getting my code to work (code is at the bottom)1.3.pdfpratyushraj61
I need help getting my code to work (code is at the bottom)
1.3. Overview
For this assignment you will be writing a program the asks the user to enter a decimal number
and stores it in IEEE 754 single-precision floating point representation. You will then parse the
IEEE 754 representation to extract the different pieces (sign, exponent, and significand)
You do not have to convert the input to IEEE 754 representation manually. Just use the syscall to
read a float. This will automatically store the value in IEEE 754 format for you. You can then
copy the value to a normal 32-bit register to perform the different bit manipulations to extract
each piece.
After the initial reading in of the floating point value and moving the value to a standard register
you should not use the floating point registers again. Do not use any of the floating point
operations to find the sign, or anything else.
All of the parsing and calculations should be done using various bit manipulations operations
(i.e. bitshifts, maskings, etc). Remember beyond the initial reading of the floating point value
and moving it to a standard register your program should not touch the floating point registers
again.
Your program does not need to handle any of the special cases of floating point numbers like
NaN, infinity, -infinity, 0 or -0.
1.4. Task 1: Main Procedure
Your first task is to collect is to create a loop for your program. Ask user to enter "Do you want
to do it again?" in a Dialog box. Hint: Use syscall 50. If the user answers YES repeat the process.
NO or Cancel, exit the program.
1.5. Task 2: Take User Input Procedure
void read_float()
Next, take user input and store it in memory. Prompt the user to enter a floating point value as a
decimal number. Then, store the input value in a single precision floating point register. In a
DialogBox (syscall 52), Display a string with info about the program ex: "Welcome to the " and
capture a user input. The input should be a floating point number.
You MUST store input into memory space (ieee). To do this, first move your captured input
from the f0 floating point register to a regular temporary register using the following call:
Now, you should be able to store the value into the ieee variable in memory.
The procedure should have the following signature:
1.6. Task 3: Print the sign
void print_sign(ieee)
Your next task is to create a procedure called print_sign that will extract and interpret the sign bit
of the IEEE 754 single precision floating point number. The floating point number is the value
you collected from Task 2.
Your function will take the value as a 32-bit number in a non-floating point register (i.e. $a0).
Remember, this value is stored in your ieee memory space. You should use bit manipulations
(i.e. shifting, masking, etc) to determine the value of the sign bit. If the sign bit is a 1 your
function should print the '-' character. If it is a 0 your function should print the '+' character.
The procedure should have the.
Hewitt Packaging Company'nin denmemi %14 kupon faiz oranyla 1.000 ABD Dolar deerinde
tahvil ihra etmesi var. hra alt ayda bir faiz demeli olup, vadesine 10 yl kalmtr. Benzer riskteki
tahviller u anda yzde 12'lik bir getiri oranyla vadeye kadar satlyor. Bu Hewitt Packaging
Company tahvillerinin deeri nedir?
sorunun cevabn kelimelerle ve matematikle aklayn..
I need an explanation on what the function of the number 1.428 in .pdfpratyushraj61
I need an explanation on what the function of the number "1.428" in the following code, could
you explain it please? I have provided the code below
from PIL import Image
def fix_middle(picture):
# Swapping the red and green components in the middle of the picture
# The middle is defined as a rectangular space
# 100% of the picture height and
# 50% of the picture width centered horizontally.
width, height = picture.size
for x in range(width):
for y in range(height):
if x in range(int(width/4),int(width/4)+int(width/2)) and y in range(height):
r,g,b = picture.getpixel((x,y))
picture.putpixel((x,y),(g,r,b))
return picture
def fix_top_half(picture):
# Changing each pure yellow pixel on the top half of the image to white
# Pure yellow pixels have the red and green components maximized and the blue component
minimized
width, height = picture.size
for x in range(width):
for y in range(height):
if x in range(width) and y in range(int(height/2)):
r,g,b = picture.getpixel((x,y))
if r == 255 and g == 255 and b == 0:
picture.putpixel((x,y),(255,255,255))
return picture
def make_rect_varyh(picture):
# Rectangle upper left corner: (10% of the picture width, 70% of the picture height)
# Rectangle height: 5% of the picture height
# Rectangle width: 80% of the picture width
# Rectangle color varies from black to pure blue as the rectangle is traversed horizontally
from left to right
width, height = picture.size
for x in range(width):
for y in range(height):
if x in range(int(width/10),int(width/10)+int(width/1.25)) and y in
range(int(height/1.428),int(height/1.428)+int(height/20)):
r,g,b = picture.getpixel((x,y))
picture.putpixel((x,y),(0,0,int((x-int(width/10))/(width/1.25)*255)))
return picture
from PIL import Image
def fix_file(file_name):
# Open the file_name indicated to obtain a picture
# Call the helper functions: fox middle (picture) fix top_half (picture) make_rect_varyh
(picture)
# Show only the final picture to verify the changes
# Save the final picture as "final.png"
picture = Image.open("stop_colored.png")
picture = fix_middle(picture)
picture = fix_top_half(picture)
picture = make_rect_varyh(picture)
picture.show()
picture.save("final.png")
fix_file("stop_colored.png").
I need help coming up with a MIPS program for this.1.3. Overvi.pdfpratyushraj61
I need help coming up with a MIPS program for this.
1.3. Overview
For this assignment you will be writing a program the asks the user to enter a decimal number
and stores it in IEEE 754 single-precision floating point representation. You will then parse the
IEEE 754 representation to extract the different pieces (sign, exponent, and significand)
You do not have to convert the input to IEEE 754 representation manually. Just use the syscall to
read a float. This will automatically store the value in IEEE 754 format for you. You can then
copy the value to a normal 32-bit register to perform the different bit manipulations to extract
each piece.
After the initial reading in of the floating point value and moving the value to a standard register
you should not use the floating point registers again. Do not use any of the floating point
operations to find the sign, or anything else.
All of the parsing and calculations should be done using various bit manipulations operations
(i.e. bitshifts, maskings, etc). Remember beyond the initial reading of the floating point value
and moving it to a standard register your program should not touch the floating point registers
again.
Your program does not need to handle any of the special cases of floating point numbers like
NaN, infinity, -infinity, 0 or -0.
1.4. Task 1: Main Procedure
Your first task is to collect is to create a loop for your program. Ask user to enter "Do you want
to do it again?" in a Dialog box. Hint: Use syscall 50. If the user answers YES repeat the process.
NO or Cancel, exit the program.
1.5. Task 2: Take User Input Procedure
void read_float()
Next, take user input and store it in memory. Prompt the user to enter a floating point value as a
decimal number. Then, store the input value in a single precision floating point register. In a
DialogBox (syscall 52), Display a string with info about the program ex: "Welcome to the " and
capture a user input. The input should be a floating point number.
You MUST store input into memory space (ieee). To do this, first move your captured input
from the f0 floating point register to a regular temporary register using the following call:
Now, you should be able to store the value into the ieee variable in memory.
The procedure should have the following signature:
1.6. Task 3: Print the sign
void print_sign(ieee)
Your next task is to create a procedure called print_sign that will extract and interpret the sign bit
of the IEEE 754 single precision floating point number. The floating point number is the value
you collected from Task 2.
Your function will take the value as a 32-bit number in a non-floating point register (i.e. $a0).
Remember, this value is stored in your ieee memory space. You should use bit manipulations
(i.e. shifting, masking, etc) to determine the value of the sign bit. If the sign bit is a 1 your
function should print the '-' character. If it is a 0 your function should print the '+' character.
The procedure should have the followi.
I need help being able to enable different voting types such as publ.pdfpratyushraj61
I need help being able to enable different voting types such as public, anonymous, and private
(only the creator of the poll can view) for a type of google forms clone program. In c++ or
python if possible..
How do zoned reserves manage relations with local people1. Zone.pdfpratyushraj61
How do zoned reserves manage relations with local people?
1. Zoned reserves allow local people to remain culturally engaged with a protected area by
allowing them to continue traditional use of a limited portion
2. Zoned reserves follow the preservationist ethic and set aside their entire territory as wilderness
areas, with no consumptive use by local people allowed.
3. Zoned reserves do not exclude local people, allowing traditional land use in all portions of
protected areas.
4. Zoned reserves exclude local people from all portions of protected areas with large numbers of
enforcement personnel..
I have included the person.h file code. 1-4 In a file called functio.pdfpratyushraj61
I have included the person.h file code. 1-4 In a file called function-1-4.cpp, include Person.h and
write a function called that takes a PersonList struct and returns a new PersonList struct that is a
shallow copy of the original. That is, the people field of the new struct should point to the same
array of n Person structs as the original. Implement a program with a main method that tests your
code in a file called main-1-4.cpp..
Here is my code for a linefile editor import java.io.BufferedRea.pdfpratyushraj61
Here is my code for a line/file editor:
import java.io.BufferedReader;
import java.io.File;
import java.io.FileReader;
import java.io.IOException;
import java.util.ArrayList;
import java.util.List;
import java.util.Scanner;
public class FileEdit {
public static List lines = new ArrayList();
public static void main(String[] args) throws IOException
{
Scanner s = new Scanner(System.in);
System.out.print("EDIT: ");
String fileName = s.nextLine();
BufferedReader br = new BufferedReader(new FileReader(new File(fileName)));
String str="";
int count=0;
while((str=br.readLine())!=null)
{
lines.add(count, str);
System.out.println((++count) + "> "+ str);
}
String text="";
String command = "";
System.out.print((++count)+"> ");
command=s.nextLine();
String commandArr[];
int flag;
while(!command.equals("E"))
{
flag=0;
commandArr = command.split("\\s");
if(commandArr[0].equals("I")) //Insertion
{
while(true)
{
if(commandArr.length==1&&flag!=2)
{
System.out.print((count)+"> ");
text = s.nextLine();
insertLine(text,count-1);
}
else if(commandArr.length==2&&flag!=2)
{
System.out.print((commandArr[1])+"> ");
count=Integer.parseInt(commandArr[1]);
text = s.nextLine();
insertLine(text,Integer.parseInt(commandArr[1])-1);
}
else
insertLine(text,count-1);
System.out.print((++count)+"> ");
command=s.nextLine();
commandArr = command.split("\\s");
if(commandArr[0].equals("I")||commandArr[0].equals("L")||commandArr[0].equals("D")||comm
andArr[0].equals("E"))
{
flag=1;
break;
}
else
{
flag=2;
text=command;
}
}
}
else if(commandArr[0].equals("L")) //Listing
{
printList();
}
else if(commandArr[0].equals("D")) //Deletion
{
if(commandArr.length==1)
{
deleteLine(count-1,count-1);
}
else if(commandArr.length==2)
{
deleteLine(Integer.parseInt(commandArr[1])-1,Integer.parseInt(commandArr[1])-1);
}
else if(commandArr.length==3)
{
deleteLine(Integer.parseInt(commandArr[1])-1,Integer.parseInt(commandArr[2])-1);
}
count=lines.size();
}
if(flag!=1)
{
System.out.print((count++)+"> ");
command = s.nextLine();
}
}
}
public static void insertLine(String text,int count)
{
if (count >= lines.size()) {
for(int i = lines.size(); i <= count; i++) {
lines.add(null);
}
}
lines.set(count,text);
}
public static void deleteLine(int start,int end)
{
for(int i=start;i<=end;i++)
lines.remove(i);
}
public static void printList()
{
for(int i=0;i "+lines.get(i));
}
}
Here is my output:
EDIT: textin.txt
1> The First Line
1>
2> And another line
3> I 3
3> The second line
4> One more line
5> L
1> null
2> null
3> The second line
4> One more line
5> D 2
3> L
1> null
2> The second line
3> One more line
4> E
How can I keep it from printing "null" after ">" and it just be blank. I need the output to look like
this:
1> The first line
2>
3> And another line
4> I 3
3> The second line
4> One more line
5> L
1> The first line
2>
3> The second line
4> One more line
5> And another line
5> D 2
4> L
1> The first line
2> The second line
3> One more line
4> And another line
5> E.
I have a question regarding extreme value analysis.I fitted a gene.pdfpratyushraj61
I have a question regarding extreme value analysis.
I fitted a generalized extreme distribution to my track records data using get.fit.
I tried to use stationary, linear, quadratic models, and for the stationary model, the MLE would
be written as
but how can I write MLEs as a vector for the linear and quadratic models?.
I am wondering if i can implement these use cases to make a google f.pdfpratyushraj61
I am wondering if i can implement these use cases to make a google forms type of program using
c++ or python?
1. Use case: GUI login
Primary actor: User
Goal: To give the user the ability to log in/sign up to an account
Preconditions: System needs to get input of username and password to store in the correct
variables
Trigger: By clicking confirm after entering a username and password
Scenario:
- User arrives at web application home page
- User enters username and password
- User presses confirm
- System stores username and password
Exceptions:
- Username is already in use: User enters an unused username
- Password/Username is empty: User checks both username and password are filled in
Priority: Essential
When available: First iteration
Frequency of use: Whenever the user wants to log in
Channel to actor: via login interface
Open issues:
- What if the username is already used?
- What if the user forgets their username/password?
2. Use case: Profile Information
Primary actor: User
Goal: Store information about the user that can be used to invite users based on criteria entered
Preconditions: System needs to be able to recognize the variables inputted and store them
correctly an associate it with the correct login credentials
Trigger: User confirms the entered information provided
Scenario:
- User is sent to profile interface after creating an account
- User enters information in the indicated fields
- User presses confirm
- System stores the provided information from user
Exceptions:
- Any empty fields present: User checks that all fields are filled in
- Information is incorrect for the field: User enters in correct option for the field
Priority: Essential
When available: First iteration
Frequency of use: Once for each user during creation of account; possibly whenever the user
desires after creation
Channel to actor: via profile interface
Open issues:
- Will an error message pop up if the user does not enter information on one of the fields?
- What if the user does not want to enter any profile information?
- Will there be a minimum requirement of information to enter for all users?
3. Use case: Error message for login interface
Primary actor: System
Goal: A message to notify the user they entered the incorrect login information
Preconditions: System needs to recognize the login credentials matches one the profiles within
the library/list stored in the system
Trigger: The username/ password entered by the user doesnt match any profile login credentials
stored within the system.
Scenario:
- User arrives at login interface
- User enters login credentials
- Username or password is not recognized by the system
- Message pops up to notify the user incorrect username/password
- User reenters correct credentials
Exceptions:
- If one of the credentials is wrong: User still reenters both username and password
- User continues to enter incorrect credentials: Error message will still indicate that the
credentials are wrong until correct credentials are .
Hull Consultants, a famous think tank in the Midwest, has provided p.pdfpratyushraj61
Hull Consultants, a famous think tank in the Midwest, has provided probability estimates for the
four potential economic states for the coming year. The probability of a boom economy is %, the
probability of a stable growth economy is %, the probability of a stagnant economy is %, and the
probability of a recession is %. Estimate the expected returns on the following individual
investments for the coming year, LOADING....
What is the expected return of the stock investment? (Click on the following icon in order to
copy its contents into a spreadsheet.).
Hughes (2004) says, �large-scale complexity characterizes the post-W.pdfpratyushraj61
Hughes (2004) says, large-scale complexity characterizes the post-World War II era of
technological systems and distinguishes it from the preceding machine era. Because of this
complexity, the control, or management of technological systems becomes a major problem for
engineers and other expert professionals (p. 77). Electricity is one example of a technology
implemented in such a way as to become a large-scale technological system.
What is the significance of the move to large-scale technological systems?.
help please thanks 1. Match the statements below to the age .pdfpratyushraj61
help please thanks 1. Match the statements below to the age pyramid that they describe. High
fertility rate High life expectancy Typical of a developing nation, such as Ethiopia Typical of a
developed nation, such as Canada.
HU245 Unidad 2 Asignaci�nCuadro comparativo de teor�as �ticas.pdfpratyushraj61
HU245 Unidad 2 Asignacin
Cuadro comparativo de teoras ticas
Utilitarismo
Egosmo tico
tica del cuidado
Kantianismo
Deberes prima facie
Teora del Comando Divino
teora de la virtud
Cmo se determina el bien?
Filsofos ms destacados
Fortalezas principales
Principales debilidades
Utilitarismo
Egosmo tico
tica del cuidado
Kantianismo
Deberes prima facie
Teora del Comando Divino
teora de la virtud
Cmo se determina el bien?
Filsofos ms destacados
Fortalezas principales
Principales debilidades.
Html please do it step by step make sure mention which codes goes .pdfpratyushraj61
Html
please do it step by step make sure mention which codes goes to which file run it on r e p lit.
com
Use the following site to help you with this lab.
Have 5 buttons (or more) to make a music/sound effect machine. Have a series of buttons that
are labeled. They should play a sound when clicked.
Try to make a box or something that holds the buttons, so to looks like a sound machine. You are
welcomed to use an Image Map tool to place links on an image (of a sound machine) if you want
it to look more realistic. Here is how Images Maps work. Even use Cool Text to make fancy text
if you like.
Site for:
Music
Sound Effects.
hi, i answered just the a part... the rest, i need help with them .pdfpratyushraj61
hi, i answered just the "a" part... the rest, i need help with them pls. 7. Leber congenital
amaurosis (LCA) is a congenital blindness disorder, which can be caused due to mutations in any
of 14 genes. (a) One key gene is CRB1, which is involved in the development of the
photoreceptors in the eye. What cells have the CRB1 gene? Which cells do you think likely
express CRB1? (b) Shown is the untranslated region & start of the first exon of CRB1. Figure
out which strand is the coding strand and translate to determine the effect of the mutation..
htmlplease do it step by step mention code which it goes into. run.pdfpratyushraj61
html
please do it step by step mention code which it goes into. run it Rep LIT. com make sure it runs
the code
Using the WickEditor create a scene that consists of :
Make a moving scene where some objects move across the screen using Tweens on different
layers.
You should set the frame rate to 30 frames per second. Have 3 or more seconds worth of
animation. Ideally the scene should look well when repeated.
Suggestions:
Falling objects: like snow, rain, leaves
Vehicle, animals, objects or people moving on a road Balloons, rockets, other objects going up
into the sky
Export your project as an Animation, Video.
Then make a webpage that shows your animation.
But also upload the wick file so I can view your project code..
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
I concur, technology is so engrained in our day-to-day activities (w.pdf
1. I concur, technology is so engrained in our day-to-day activities (work, family, friends, etc.) that
we cannot do without it. What does it mean for us? What does it mean for business that are
trying to sell us services and items?