Description
- An infinite loop is an example of a ____ error.logicsyntaxrun-timesystem
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
run-time.
Completion Status:
100%
Review
Review
Anonymous
I was having a hard time with this subject, and this was a great help.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
UC Application of Blockchain Technology in Combatting Click Fraud Essay
Read the attached PDF article entitled, "How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas ...
UC Application of Blockchain Technology in Combatting Click Fraud Essay
Read the attached PDF article entitled, "How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas".The six pending research areas mentioned in the article are:1) Fosters disintermediation2) Aids in combatting click fraud,3) Reinforces trust and transparency,4) Enables enhanced privacy protection,4) empowers security, and6) Enables creative loyalty programs.After reading the article in full, select one of the mentioned six areas of research and write a paper minimum 8-9 maximum page identifying the following; The following questions should be answered in relevance to the one topic you choose from above mentioned 6 topics from research paper.1) Describe and provide the overall research area mentioned in the article in a synopsis on your chosen topic.2) on your chosen topic, what did the article state in how Blockchain can benefit that marketing area overall ?3) on your chosen topic, what further research did the article recommend ?4) What do you think can be the approach to further research the topic? What approach would you recommend to take and what type of research method would make sense? -- Research methods should be different from what article mentioned. These should be from your own research and not from the article attached. 5) What is an example of a company that you believe would benefit from this type of research and why? -- use an industry or company as an example and tie that to the research methods you have come up with your research in question 4 6) Outside of Blockchain, what other piece of marketing technology can help this area? --- In relevance to the company you chose in question 5.7) What do you recommend is the best way to approach for a company to implement this area of research into their company? - In terms of partnering with other companies like veem that implements security of any other company that can be partnered with to implement your research area. Paper must be 12Pt. Font, Times New Roman, Double Spaced, with title page and reference page. Minimum of 5 references, to include the article required. The title page and references page do NOT count towards the minimum.
17 pages
Computer Science Pro
General Motors Company operates in a highly competitive and dynamic business environment that calls for effective informat ...
Computer Science Pro
General Motors Company operates in a highly competitive and dynamic business environment that calls for effective information governance. Information ...
Need these questions answered...
Question 1-3 should be submitted in a single Microsoft Word file. Be sure to clearly label your solutions. Questions 4-6 s ...
Need these questions answered...
Question 1-3 should be submitted in a single Microsoft Word file. Be sure to clearly label your solutions. Questions 4-6 should be submitted as C++programs/files.Your week 8 final exam rubric is included in the assignment details page, or you may also click on the "See Rubric" button at the top of your dropbox page to view how the instructor will grade your assignment. Click on the "Assignments" link in the left sidebar to access your weekly dropboxes. After you have completed your assignment, title your file(s) with: LastNameCourseIDFinalExamQ# (ex. SmithGU100FinalExamQ1), attach them to this dropbox, and press Submit. *Please add the question number to the end of your file; for example question 1 will be Q1, question 4 will be Q4, etc. Question 1Consider the following program:#include #include #include using namespace std;int main(){ int num1; int num2; cout << fixed << showpoint << setprecision(2); cout << "Enter two integers: "; cin >> num1 >> num2; cout << endl; if (num1 != 0 && num2 != 0) cout << sqrt(abs(num1 + num2) + 0.5) << endl; else if (num1 != 0) cout << floor(num1 + 0.5) << endl; else if (num2 != 0) cout << ceil(num2 + 0.5) << endl; else cout << 0 << endl; return 0; }a. What is the output if the input is -23 8? b. What is the output if the input is 12 32? c. What is the output if the input is 15 0? d. What is the output if the input is 0 -36? e. What is the output if the input is 0 0?Question 2Write the definition of a function that takes as input the three numbers. The function returns true if the first number to the power of the second number equals the third number; otherwise, it returns false. (Assume that the three numbers are of type double).Question 3Write C++ statements that do the following:Define an enum type, birdType, with the values PEACOCK, SPARROW, CANARY, PARROT, PENGUIN, OSTRICH, EAGLE, CARDINAL, and HUMMINGBIRD.Declare a variable bird of the type birdType.Assign CANARY to the variable bird.Advance bird to the next value in the list.Decrement bird to the previous value in the list.Output the value of the variable bird.Input value in the variable bird.Question 4Write C++ statement(s) to do the following:Declare an array alpha of 50 components of type int.Initialize each component of alpha to -1.Output the value of the first component of the array alpha.Set the value of the twenty-fifth component of the array alpha to 62.Set the value of the tenth component of alpha to three times the value of the fiftieth component of alpha plus 10.Use a for loop to output the value of a component of alpha if its index is a multiple of 2 or 3.Output the value of the last component of alpha.Output the value of the alpha so that 15 components per line are printed.Use a for loop to increment every other element (the even indexed elements).Use a for loop to create a new array, diffAlpha, whose elements are the differences between consecutive elements in alpha.Question 5A car dealer has 10 salespersons. Each salesperson keeps track of the number of cars sold each month and reports it to the management at the end of the month. The management keeps the data in a file and assigns a number, 1 to 10, to each salesperson. The following statement declares an array, cars, of 10 components of type int to store the number of cars sold by each salesperson:int cars[10];Write the code to store the number of cars sold by each salesperson in the array cars, output the total numbers of cars sold at the end of each month, and output the salesperson number selling the maximum number of cars. (Assume that data is in the file cars.dat, and that this file has been opened using the ifstream variable inFile.)Question 6Suppose that you have the following definitions:struct timeType{ int hr; double min; int sec;};struct tourType{ string cityName; int distance; timeType travelTime;};Declare the variable destination of type tourType.Write C++ statements to store the following data in destination: cityName—Chicago, distance—550 miles, travelTime—9 hours and 30 minutes.Write the definition of a function to output the data stored in a variable of type tourType.Write the definition of a value-returning function that inputs data into a variable of type tourType.Write the definition of a void function with a reference parameter of type tourType to input data in a variable of type tourType.CriteriaNeeds ImprovementSatisfactoryExcellentPoints PossibleDeliveryCompleted fewer than 80% of the requirementsNot delivered on time, or in the incorrect formatCompleted most of the requirementsDelivered on time, and in correct formatCompleted 100% of the requirements.Delivered on time, and in correct format0-20Coding StandardsName, date, or assignment title missingPoor use of white space (indentation, blank lines)Disorganized and messyPoor use of variables (many global variables, unambiguous naming)Includes name, date, and assignment titleWhite space makes program fairly easy to readOrganized workGood use of variables (some global variables, unambiguous naming)Includes name, date, and assignment titleExcellent use of white spaceEfficiently organized workExcellent use of variables (no global variables, unambiguous naming)0-20DocumentationNo documentation includedBasic documentation has been completed including descriptions of all variablesPurpose is noted for each functionClearly and effectively documented including descriptions of all variablesSpecific purpose is noted for each function, control structure, input requirements, and output results0-20ExecutionProgram does not execute due to errorsUser prompts are misleading or non-existentExecutes without errorsUser prompts are understandableExecutes without errorsExcellent user prompts, good use of symbols, spacing in output0-20Solution EfficiencySolution is difficult and inefficientA logical solution that is easy to follow but is not the most efficientSolution is efficient, easy to understand, and easy to maintain0-20
6 pages
Security Privacy And Risks Within Smart Cities Literature Review And Development Of A Smart City Interaction Framework 23rd
Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework A ...
Security Privacy And Risks Within Smart Cities Literature Review And Development Of A Smart City Interaction Framework 23rd
Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework Abstract- The main aim of ...
CS 230 Colorado Tech Contributor Functions Data Structure Program Project
Your first task in developing the application for tracking contributors is to load a list of the people who are helping th ...
CS 230 Colorado Tech Contributor Functions Data Structure Program Project
Your first task in developing the application for tracking contributors is to load a list of the people who are helping the cause. Design and develop a linked list, implemented as a stack, to track all of the contributors. You will read the contributor information from a file provided; it is a comma delimited (CSV) file. Your design should include the following:Each contributor will have the following Information:Name: String; //the name of the contributorCity: String; //the city in which the contributor livesCountry: String; //the country in which the contributor livesPhone: String; //the phone number for the contributorContribution: Double; //the amount of the contribution given by the contributor to the zooID: Integer; //identifier key for future needs Contributor Functions/Methods:Input constructor: //to accept a string for the name and additional information for each contributor (this should call the Push constructor to implement the stack)Print constructor: //to print out the contributor dataPop constructorPush constructor Deliverables:A fully documented program to load the data implemented as a stackA test plan to show how the program runs and can be executedA screenshot showing that the program loaded the data, and after all data is loaded, perform a single pop of the stack
Project Part 5: Final Risk Management Plan
This project is divided into several parts, each with a deliverable. The first four parts are drafts. These documents shou ...
Project Part 5: Final Risk Management Plan
This project is divided into several parts, each with a deliverable. The first four parts are drafts. These documents should resemble business reports in that they are organized by headings, include source citations (if any), be readable, and be free from typos and grammatical errors. However, they are not final, polished reports.Please see the attached requirements.Project Part 5: Final Risk Management PlanCompile all project parts into a single risk management plan document. Reduce redundant text, if any. Incorporate instructor feedback on the previous submissions in the final risk management plan.Submission RequirementsFormat: Microsoft Word (or compatible)Font: Arial, size 12, double-spaceCitation style: Your school’s preferred style guideEstimated length: 14–20 pagesI have attached part 1 and part 2 that I submitted. The one I submitted on part 3 and 4 are wrong. Professor comments are below:Part 3 - The part 3 project is all about mitigating risks identified in Health Network Inc's IT infrastructure. For example, “Loss of company’s information on lost or stolen company-owned assets, such as mobile device and Laptop.” What type of control are you implementing to mitigate the risk? You need to use those risks you identified in the early part of the project and recommend a control.Part 4 - This part of the project should focus on the analysis of Business Impact in case of a disaster for Health Network inc. The purpose of Business impact assessment is to be prepared in case of a disaster. You should have focused on the critical business resources of the Heath Network and analyze the impact of the critical infrastructure if it were to go off. As you can see, you were writing in general terms instead of performing the analysis. For example, what is the maximum acceptable outage MAO, recovery time objective RTO for the Heath Network inc? You need to state how many hours or days that the organization can accept. Please, ensure that you.
Similar Content
Southern New Hampshire University Cyber Security Essay
Overview: Courses of action tables are intended to be living documents that change as attackers evolve their attacks and i...
Failed Organizational change, computer science assignment help
Please find assignmentment instructions in attached folder...
Password testing
Please Answer the following question in APA formatted paper, you may have introduction and brief history on the subject pr...
Nautilus IT Consulting (NITC) is a computer technology business that helps organizations with IT solutions.
Due: Sunday, End of Module by 11:55 p.m. ESTNautilus IT Consulting (NITC) is a computer technology business that helps org...
IT Project Management &Technology in Organizations Discussions
What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-d...
Indiana State University Vlookup Function Project
Hello I need help making this changes Please follow the instructions attached step by step ...
Customer Edited
CUST ID REGION RENT VS. OWN NUM HOUSEHOLD ANNUAL INCOME NUM PURCHASES Household Type East Small Household Region Abbrevia...
20617983
a. Information governance is critical in the operations of every organization. b. Iles (2013) asserts that when compared t...
The Need For Wireless Standards And Protocols 1
The role played by wireless standards and protocols in development of products, research and development and marketing ini...
Related Tags
Book Guides
The Restless Wave
by John McCain
East of Eden
by John Steinback
Sense And Sensibility
by Jane Austen
Big Magic
by Elizabeth Gilbert
Cat on a Hot Tin Roof
by Tennessee Williams
What Happened
by Hillary Clinton
Shutter Island
by Dennis Lehane
Cant Hurt Me - Master Your Mind and Defy the Odds
by David Goggins
All the Kings Men
by Robert Penn Warren
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
UC Application of Blockchain Technology in Combatting Click Fraud Essay
Read the attached PDF article entitled, "How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas ...
UC Application of Blockchain Technology in Combatting Click Fraud Essay
Read the attached PDF article entitled, "How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas".The six pending research areas mentioned in the article are:1) Fosters disintermediation2) Aids in combatting click fraud,3) Reinforces trust and transparency,4) Enables enhanced privacy protection,4) empowers security, and6) Enables creative loyalty programs.After reading the article in full, select one of the mentioned six areas of research and write a paper minimum 8-9 maximum page identifying the following; The following questions should be answered in relevance to the one topic you choose from above mentioned 6 topics from research paper.1) Describe and provide the overall research area mentioned in the article in a synopsis on your chosen topic.2) on your chosen topic, what did the article state in how Blockchain can benefit that marketing area overall ?3) on your chosen topic, what further research did the article recommend ?4) What do you think can be the approach to further research the topic? What approach would you recommend to take and what type of research method would make sense? -- Research methods should be different from what article mentioned. These should be from your own research and not from the article attached. 5) What is an example of a company that you believe would benefit from this type of research and why? -- use an industry or company as an example and tie that to the research methods you have come up with your research in question 4 6) Outside of Blockchain, what other piece of marketing technology can help this area? --- In relevance to the company you chose in question 5.7) What do you recommend is the best way to approach for a company to implement this area of research into their company? - In terms of partnering with other companies like veem that implements security of any other company that can be partnered with to implement your research area. Paper must be 12Pt. Font, Times New Roman, Double Spaced, with title page and reference page. Minimum of 5 references, to include the article required. The title page and references page do NOT count towards the minimum.
17 pages
Computer Science Pro
General Motors Company operates in a highly competitive and dynamic business environment that calls for effective informat ...
Computer Science Pro
General Motors Company operates in a highly competitive and dynamic business environment that calls for effective information governance. Information ...
Need these questions answered...
Question 1-3 should be submitted in a single Microsoft Word file. Be sure to clearly label your solutions. Questions 4-6 s ...
Need these questions answered...
Question 1-3 should be submitted in a single Microsoft Word file. Be sure to clearly label your solutions. Questions 4-6 should be submitted as C++programs/files.Your week 8 final exam rubric is included in the assignment details page, or you may also click on the "See Rubric" button at the top of your dropbox page to view how the instructor will grade your assignment. Click on the "Assignments" link in the left sidebar to access your weekly dropboxes. After you have completed your assignment, title your file(s) with: LastNameCourseIDFinalExamQ# (ex. SmithGU100FinalExamQ1), attach them to this dropbox, and press Submit. *Please add the question number to the end of your file; for example question 1 will be Q1, question 4 will be Q4, etc. Question 1Consider the following program:#include #include #include using namespace std;int main(){ int num1; int num2; cout << fixed << showpoint << setprecision(2); cout << "Enter two integers: "; cin >> num1 >> num2; cout << endl; if (num1 != 0 && num2 != 0) cout << sqrt(abs(num1 + num2) + 0.5) << endl; else if (num1 != 0) cout << floor(num1 + 0.5) << endl; else if (num2 != 0) cout << ceil(num2 + 0.5) << endl; else cout << 0 << endl; return 0; }a. What is the output if the input is -23 8? b. What is the output if the input is 12 32? c. What is the output if the input is 15 0? d. What is the output if the input is 0 -36? e. What is the output if the input is 0 0?Question 2Write the definition of a function that takes as input the three numbers. The function returns true if the first number to the power of the second number equals the third number; otherwise, it returns false. (Assume that the three numbers are of type double).Question 3Write C++ statements that do the following:Define an enum type, birdType, with the values PEACOCK, SPARROW, CANARY, PARROT, PENGUIN, OSTRICH, EAGLE, CARDINAL, and HUMMINGBIRD.Declare a variable bird of the type birdType.Assign CANARY to the variable bird.Advance bird to the next value in the list.Decrement bird to the previous value in the list.Output the value of the variable bird.Input value in the variable bird.Question 4Write C++ statement(s) to do the following:Declare an array alpha of 50 components of type int.Initialize each component of alpha to -1.Output the value of the first component of the array alpha.Set the value of the twenty-fifth component of the array alpha to 62.Set the value of the tenth component of alpha to three times the value of the fiftieth component of alpha plus 10.Use a for loop to output the value of a component of alpha if its index is a multiple of 2 or 3.Output the value of the last component of alpha.Output the value of the alpha so that 15 components per line are printed.Use a for loop to increment every other element (the even indexed elements).Use a for loop to create a new array, diffAlpha, whose elements are the differences between consecutive elements in alpha.Question 5A car dealer has 10 salespersons. Each salesperson keeps track of the number of cars sold each month and reports it to the management at the end of the month. The management keeps the data in a file and assigns a number, 1 to 10, to each salesperson. The following statement declares an array, cars, of 10 components of type int to store the number of cars sold by each salesperson:int cars[10];Write the code to store the number of cars sold by each salesperson in the array cars, output the total numbers of cars sold at the end of each month, and output the salesperson number selling the maximum number of cars. (Assume that data is in the file cars.dat, and that this file has been opened using the ifstream variable inFile.)Question 6Suppose that you have the following definitions:struct timeType{ int hr; double min; int sec;};struct tourType{ string cityName; int distance; timeType travelTime;};Declare the variable destination of type tourType.Write C++ statements to store the following data in destination: cityName—Chicago, distance—550 miles, travelTime—9 hours and 30 minutes.Write the definition of a function to output the data stored in a variable of type tourType.Write the definition of a value-returning function that inputs data into a variable of type tourType.Write the definition of a void function with a reference parameter of type tourType to input data in a variable of type tourType.CriteriaNeeds ImprovementSatisfactoryExcellentPoints PossibleDeliveryCompleted fewer than 80% of the requirementsNot delivered on time, or in the incorrect formatCompleted most of the requirementsDelivered on time, and in correct formatCompleted 100% of the requirements.Delivered on time, and in correct format0-20Coding StandardsName, date, or assignment title missingPoor use of white space (indentation, blank lines)Disorganized and messyPoor use of variables (many global variables, unambiguous naming)Includes name, date, and assignment titleWhite space makes program fairly easy to readOrganized workGood use of variables (some global variables, unambiguous naming)Includes name, date, and assignment titleExcellent use of white spaceEfficiently organized workExcellent use of variables (no global variables, unambiguous naming)0-20DocumentationNo documentation includedBasic documentation has been completed including descriptions of all variablesPurpose is noted for each functionClearly and effectively documented including descriptions of all variablesSpecific purpose is noted for each function, control structure, input requirements, and output results0-20ExecutionProgram does not execute due to errorsUser prompts are misleading or non-existentExecutes without errorsUser prompts are understandableExecutes without errorsExcellent user prompts, good use of symbols, spacing in output0-20Solution EfficiencySolution is difficult and inefficientA logical solution that is easy to follow but is not the most efficientSolution is efficient, easy to understand, and easy to maintain0-20
6 pages
Security Privacy And Risks Within Smart Cities Literature Review And Development Of A Smart City Interaction Framework 23rd
Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework A ...
Security Privacy And Risks Within Smart Cities Literature Review And Development Of A Smart City Interaction Framework 23rd
Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework Abstract- The main aim of ...
CS 230 Colorado Tech Contributor Functions Data Structure Program Project
Your first task in developing the application for tracking contributors is to load a list of the people who are helping th ...
CS 230 Colorado Tech Contributor Functions Data Structure Program Project
Your first task in developing the application for tracking contributors is to load a list of the people who are helping the cause. Design and develop a linked list, implemented as a stack, to track all of the contributors. You will read the contributor information from a file provided; it is a comma delimited (CSV) file. Your design should include the following:Each contributor will have the following Information:Name: String; //the name of the contributorCity: String; //the city in which the contributor livesCountry: String; //the country in which the contributor livesPhone: String; //the phone number for the contributorContribution: Double; //the amount of the contribution given by the contributor to the zooID: Integer; //identifier key for future needs Contributor Functions/Methods:Input constructor: //to accept a string for the name and additional information for each contributor (this should call the Push constructor to implement the stack)Print constructor: //to print out the contributor dataPop constructorPush constructor Deliverables:A fully documented program to load the data implemented as a stackA test plan to show how the program runs and can be executedA screenshot showing that the program loaded the data, and after all data is loaded, perform a single pop of the stack
Project Part 5: Final Risk Management Plan
This project is divided into several parts, each with a deliverable. The first four parts are drafts. These documents shou ...
Project Part 5: Final Risk Management Plan
This project is divided into several parts, each with a deliverable. The first four parts are drafts. These documents should resemble business reports in that they are organized by headings, include source citations (if any), be readable, and be free from typos and grammatical errors. However, they are not final, polished reports.Please see the attached requirements.Project Part 5: Final Risk Management PlanCompile all project parts into a single risk management plan document. Reduce redundant text, if any. Incorporate instructor feedback on the previous submissions in the final risk management plan.Submission RequirementsFormat: Microsoft Word (or compatible)Font: Arial, size 12, double-spaceCitation style: Your school’s preferred style guideEstimated length: 14–20 pagesI have attached part 1 and part 2 that I submitted. The one I submitted on part 3 and 4 are wrong. Professor comments are below:Part 3 - The part 3 project is all about mitigating risks identified in Health Network Inc's IT infrastructure. For example, “Loss of company’s information on lost or stolen company-owned assets, such as mobile device and Laptop.” What type of control are you implementing to mitigate the risk? You need to use those risks you identified in the early part of the project and recommend a control.Part 4 - This part of the project should focus on the analysis of Business Impact in case of a disaster for Health Network inc. The purpose of Business impact assessment is to be prepared in case of a disaster. You should have focused on the critical business resources of the Heath Network and analyze the impact of the critical infrastructure if it were to go off. As you can see, you were writing in general terms instead of performing the analysis. For example, what is the maximum acceptable outage MAO, recovery time objective RTO for the Heath Network inc? You need to state how many hours or days that the organization can accept. Please, ensure that you.
Earn money selling
your Study Documents