...Question 2c Different Audiences can respond differently to the same media text for a range of reasons. Some could have oppositional readings and instantly disagree with what creators wanted the text to convey and its intended meaning. This could be down to many reasons such as the fact that they could have different backgrounds, ethnicities, beliefs and different experiences to what the producer is trying to show us, not allowing for a relatable or identifiable text or situation to provide and support the user gratification theory. Another factor could be purely down to the age of the viewer, they may not understand or agree, or wish to conform with what is being shown on screen. For example, the 2015 John Lewis advert would appeal to very different audiences. Typically a white, British, middle class, family orientated person would share a dominant reading and would ratify and agree with the producer’s intending meaning, as the John Lewis Christmas ‘persona’ has such a valuable part in Christmas culture in the middle classes, they would dismiss any obvious flaws such as space and science constraints and dive into a world of childish, Christmas fun in the touching way the producer intended. This would ensure the Middle class’s continued custom within the John Lewis department store chain. However, a Black, lower class citizen, not astute with British culture and subculture may not be able to relate to the advert and therefore not establish or continue custom at John Lewis. The...
Words: 382 - Pages: 2
...Question 1 Change the following infix expression postfix expression. (A + B)*C+D/E-F Question 2 Suppose a 3d array LA is declared using LA(3:8, -4:1, 6: 9), base(LA)=200, w=4. find loc of LA[2,-2,5]. (Row major order). Question 3 Convert the expression (True && False) || !(False || True) to postfix expression. Show the contents of the stack at every step. Question 4 Use a stack to evaluate the following postfix expression and show the content of the stack after execution of each operation. Don't write any code. Assume as if you are using push and pop member functions of the stack. AB-CD+E*+ (where A=5, B=3, C=5, D =4, and E=2) Question 5 Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : 50,40,+,18, 14,-, *,+ Question 6 Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : TRUE, FALSE, TRUE, FALSE, NOT, OR, TRUE, OR, OR, AND Question 7 Write a program for creating polynomial using linked list? Question 8 Each node of a STACK contains the following information, in addition to required pointer field : i) Roll number of the student ii) Age of the student Give the structure of node for the linked stack in question TOP is a pointer which points to the topmost node of the STACK. Write the...
Words: 308 - Pages: 2
...hardcopy) Weighting: Part of 10% of overall assessment. Environment: You are required to do this assignment in C++ environment. Assessment Your assignment will be assessed for the following: Correctness of the programs Sample test data/results/output or discussion of results No plagiarism Submission You are required to submit documentation in the form of printed copy of your codes and sample test data. Your submission should bind together with the assignment cover given at the end of this assignment question. Use GREEN colour paper as your Assignment 1 cover. Warning 1. To be done in individually. 2. Marks will be deducted for plagiarism and late submission. ASSIGNMENT QUESTION: Question 1 (50 marks) In linked list, an ordered collection of data in which each element contains the location of the next element or elements using pointers. You are required to build a singly linked list program in C++ programming: 1) Create a singly linked list that contains data of 2,15,8,24,63,77 and print out the output. (10 marks) 2) With the creation of the linked list data, delete the no 8, 24 and 77 and print out the output. (5 marks) 3) Add the no 10 ,25 and 30 in your list and print out the output. (5 marks) Question 2 5. You are required to write a C++ program that indicates Linked List : a) Create a structure “model”. This structure basically has members of...
Words: 503 - Pages: 3
...Yourself C in 24 Hours Previous | Table of Contents | Next Hour 1 - Getting Started A journey of a thousand miles is started by taking the first step. —Chinese proverb High thoughts must have high language. —Aristophanes Welcome to Teach Yourself C in 24 Hours. In this first lesson you'll learn the following: What C is Why you need to learn C The ANSI standard Hardware and software required in order to run the C program What Is C? C is a programming language. The C language was first developed in 1972 by Dennis Ritchie at AT&T Bell Labs. Ritchie called his newly developed language C simply because there was a B programming language already. (As a matter of fact, the B language led to the development of C.) C is a high-level programming language. In fact, C is one of the most popular general-purpose programming languages. In the computer world, the further a programming language is from the computer architecture, the higher the language's level. You can imagine that the lowest-level languages are machine languages that computers understand directly. The high-level programming languages, on the other hand, are closer to our human languages. (See Figure 1.1.) Figure 1.1. The language spectrum. High-level programming languages, including C, have the following advantages: Readability: Programs are easy to read. Maintainability: Programs are easy to maintain. Portability: Programs are easy to port across different computer platforms. The C language's...
Words: 73255 - Pages: 294
...Chapter 5: Retrieving Data for Computation, Analysis, and Reference TRUE/FALSE 1. A data list that categorizes values you want to retrieve is called a linkup table. ANS: F PTS: 1 REF: 291 2. A vertical lookup table is a lookup table in which the data to be searched is organized in columns. ANS: T PTS: 1 REF: 294 3. When you write a VLOOKUP formula, you indicate the value you want to look up in a table. ANS: T PTS: 1 REF: 294 4. If a lookup_value is smaller than the smallest value in the first column of table_array, VLOOKUP opens up the Lookup Wizard. ANS: F PTS: 1 REF: 297 5. When using a VLOOKUP function it’s not always obvious when a returned value is incorrect. ANS: T PTS: 1 REF: 298 6. When you use a lookup type of TRUE, the VLOOKUP function looks only for an exact match of the lookup value. ANS: F PTS: 1 REF: 299 7. Headings at the top of each column should be included as part of the lookup_range in the VLOOKUP formula. ANS: F PTS: 1 REF: 301 8. When creating a vertical lookup table with the TRUE type, be certain to start with the lowest possible value, such as 0, so that the table covers all the possible data. ANS: T PTS: 1 REF: 301 9. The syntax of the HLOOKUP function is as follows: HLOOKUP(lookup_value,table_array,row_index_num,range_lookup) ANS: T PTS: 1 REF: 303 10. The rules for an HLOOKUP function with a TRUE lookup type test the values down the first column. ANS: F PTS: 1 REF: 304 11. A...
Words: 3779 - Pages: 16
...Use what you’ve learned about the binary numbering system in this chapter to convert the following binary numbers to decimal? * 00001101=13 * 00001000=8 * 00101011=43 3. Look at the ASCII chart in Appendix A on CD that accompanies this book and determine the codes for each letter of your name? * 67 97 114 108 111 115 78 97 106 101 114 97 * C a r l o s N a j e r a 4. Use the web to research the history of the BASIC, C++, Java, and Python programming languages, and answer the following questions? * Who was the creator of each language? * When was each of these languages created? * Was there a specific motivation behind the creation of these languages? If so, what was it? * Basic was created by John George Kemeny. It was created on 1964. * C++ was created by Bjarne Stroustrup. It was created on 1979. * Java was created by Dr. James A. Gosling. It was created on 1995. * Python was created by Guido van Rossum. It was created on 1991. * The motivation behind the development of computer programming languages such as C ++, Basic, Java, and Python is that once written, a function may be used several times without rewriting it over and over. Programming languages can be used to develop programs that control the performance of a machine and/or to convey algorithms...
Words: 259 - Pages: 2
...• All the steps involved in solution of each question should be written. Just Answers are not required • Try NOT to copy paste data from your friends etc. • This is an individual assignment. PLAGIARISM IS NOT ACCEPTABLE! In case of plagiarism you will get ZERO MARKS for that question • Please do not copy paste program from your friend. • Complete the assignment nicely and submit .cpp files on email you can zip all program in one file then submit that file • Submit files in format like “yourname_yourclass_q1.cpp, yourname_yourclass_q2.cpp”, other file naming convention will not be accepted. • Submit files on uzairsaeed@riphahfsd.edu.pk • Other questions except program can be solved on Microsoft Word or alike, and plagiarism is 30% with proper reference is allowed only • Last date of submission 02-October-2013 11:55 pm Question 1: Write a function that receives 5 integers and returns the sum and average of these numbers. Call this function from main( ) and print the results in main(). Question 2: A 5-digit positive integer is entered through the keyboard, write a function to calculate sum of digits of the 5-digit number. Question 3: A positive integer is entered through the keyboard and taking input and terminates on sentinel value, write a function primeFactor that take argument of your input number and increment on even, odd or prime. At the end your program should display how many even, odd or prime numbers were entered. Question 4: Instructor: Uzair Saeed 1 Riphah International...
Words: 516 - Pages: 3
...Face Interviews Confidently! Technical Aptitude Questions Table of Contents Data Structures Aptitude ............................................................................. 3 C Aptitude .................................................................................................. 12 C++ Aptitude and OOPS ............................................................................ 75 Quantitative Aptitude............................................................................... 104 UNIX Concepts ......................................................................................... 121 RDBMS Concepts ..................................................................................... 135 SQL .......................................................................................................... 153 Computer Networks ................................................................................. 161 Operating Systems .................................................................................. 169 2 Copyright©: Vyom Network (http://www.vyomworld.com) - All Rights Reserved Technical Aptitude Questions Data Structures Aptitude Data Structures Aptitude 1. What is data structure? A data structure is a way of organizing data that considers not only the items stored, but also their relationship to each other. Advance knowledge about the relationship between data items allows designing of efficient algorithms for the manipulation of data...
Words: 31949 - Pages: 128
...Let Us C Fifth Edition Yashavant P. Kanetkar Dedicated to baba Who couldn’t be here to see this day... About the Author Destiny drew Yashavant Kanetkar towards computers when the IT industry was just making a beginning in India. Having completed his education from VJTI Mumbai and IIT Kanpur in Mechanical Engineering he started his training company in Nagpur. Yashavant has a passion for writing and is an author of several books in C, C++, VC++, C#, .NET, DirectX and COM programming. He is a much sought after speaker on various technology subjects and is a regular columnist for Express Computers and Developer 2.0. His current affiliations include being a Director of KICIT, a training company and DCube Software Technologies, a software development company. In recognition to his contribution Microsoft awarded him the prestigious “Best .NET Technical Contributor” award recently. He can be reached at kanetkar@kicit.com. Preface to the Fifth Edition It is mid 2004. World has left behind the DOTCOM bust, 9/11 tragedy, the economic downturn, etc. and moved on. Countless Indians have relentlessly worked for close to two decades to successfully establish “India” as a software brand. At times I take secret pleasure in seeing that a book that I have been part of, has contributed in its own little way in shaping so many budding careers that have made the “India” brand acceptable. Computing and the way people use C for doing it keeps changing as years go by. So overwhelming...
Words: 46379 - Pages: 186
...EAD Quiz 1 Total Marks: 100 Time: 1:10 Minutes Marks Obtained: Name: _____________________________________ Roll Number: ____________ Question(1) MCQs Select one option only. 1. repository of shared assemblies maintained by the .NET runtime is called a. assembly line b. Assembly contents c. Assembly manifest d. Global Assembly cache 2. Which key is used for step into in debugging a. F7 b. F12 c. F11 d. F10 3. Which command is used to create exe file using csc command a csc File.cs b csc /out:My.exe File.cs c none d both (a,b) 4. --------namespace is used for ado.net with data adapter a. System.io; b. System.SqlAdapter 3. System.Data 4. System.SqlDb 5. To convert reference type variable into simple type (value) is a. Unboxing b. Boxing Question(2) ( 5 Marks each) Short Answers: 1. Write differences between CLS and CLR CLS specifies a set of rules that needs to be adhered or satisfied by all language compilers targeting CLR. It helps in cross language inheritance and cross language debugging. .Net Framework provides runtime environment called Common Language Runtime (CLR).It provides an environment to run all the .Net Programs. 2. Write a function that takes any number of strings and an integer. Write only prototype and call this function using named argument Public void myFunc(int num, params string[] args); myFunc(1,”Ali”,”Ahmad”); ...
Words: 757 - Pages: 4
...day we're continuing our Java security research series by analyzing other plug-ins, browser extensions and rich internet applications that are commonly exploited. Our previous research indicated that the current state of Java affairs isn't pretty. At that time, ninety-three percent of enterprises were vulnerable to known Java exploits. Nearly 50 percent of enterprise traffic used a Java version that was more than two years out of date. Through Websense ThreatSeeker Intelligence Cloud analysis we now discover: Only 19 percent of enterprise Windows-based computers ran the latest version of Java (7u25) between August 1-29, 2013. More than 40 percent of enterprise Java requests are from browsers still using outdated Java 6. As a result, more than 80 percent of Java requests are susceptible to two popular new Java exploits: CVE-2013-2473 and CVE-2013-2463. 83.86 percent of enterprise browsers have Java enabled. Nearly 40 percent of users are not running the most up-to-date versions of Flash. In fact, nearly 25 percent of Flash installations are more than six months old, close to 20 percent are outdated by a year and nearly 11 percent are two years old. Our in-depth analysis ran for one month, across multiple verticals and industries. We surveyed millions of real-world web requests for Java usage through our global Websense ThreatSeeker Intelligence Cloud. New Java Exploits and the Neutrino Exploit Kit New Java exploits CVE-2013-2473...
Words: 1745 - Pages: 7
...Carnegie Mellon Course Overview 15-213 /18-213: Introduction to Computer Systems 1st Lecture, Jan. 14, 2014 Instructors: Seth Copen Goldstein, Anthony Rowe, Greg Kesden The course that gives CMU its “Zip”! 1 Carnegie Mellon Overview Course theme Five realities How the course fits into the CS/ECE curriculum Logistics 2 Carnegie Mellon Course Theme: Abstraction Is Good But Don’t Forget Reality Most CS and CE courses emphasize abstraction Abstract data types Asymptotic analysis These abstractions have limits Especially in the presence of bugs Need to understand details of underlying implementations Useful outcomes from taking 213 Become more effective programmers Able to find and eliminate bugs efficiently Able to understand and tune for program performance Prepare for later “systems” classes in CS & ECE Compilers, Operating Systems, Networks, Computer Architecture, Embedded Systems, Storage Systems, etc. 3 Carnegie Mellon Great Reality #1: Ints are not Integers, Floats are not Reals Example 1: Is x2 ≥ 0? Float’s: Yes! Int’s: 40000 * 40000 1600000000 50000 * 50000 ?? Source: xkcd.com/571 4 Carnegie Mellon Great Reality #1: Ints are not Integers, Floats are not Reals Example 1: Is x2 ≥ 0? Float’s: Yes! Int’s: 40000 * 40000 1600000000 50000 * 50000 ?? Example 2: Is (x + y) + z = x + (y + z)? Unsigned & Signed Int’s: Yes! Float’s: ...
Words: 2285 - Pages: 10
...Take Assessment: Exercise 3 ------------------------------------------------- 窗体顶端 | | Please answer the following question(s). If the assessment includes multiple-choice questions, click the "Submit Answers" button when you have completed those questions. | | | 1. | | Go to bottom of question. | | Implementing the Gourmet Coffee SystemPrerequisites, Goals, and OutcomesPrerequisites: Before you begin this exercise, you need mastery of the following: * Object Oriented Programming * Knowledge of class design * Class attributes * Constructors * Accessor methods * Mutator methods * Knowledge of inheritance * How to implement a specialization/generalization relationship using inheritance Goals: Reinforce your ability to implement Java classes using inheritance. Outcomes: You will demonstrate mastery of the following: * Implementing the constructors, accessors, and mutators of a Java class * Using inheritance to implement a specialization/generalization relationship Background This assignment asks you to implement some of the classes in the Gourmet Coffee System specified on Exercise 2.DescriptionIn this assessment, you will implement the classes and relationships illustrated in the following class diagram: | Figure 1 Portion of Gourmet Coffee System class diagram | The class specifications are as follows:Class ProductThe class Product models a generic product in the store.Instance variables:...
Words: 1019 - Pages: 5
...Question 1 Change the following infix expression postfix expression. (A + B)*C+D/E-F Question 2 Suppose a 3d array LA is declared using LA(3:8, -4:1, 6: 9), base(LA)=200, w=4. find loc of LA[2,-2,5]. (Row major order). Question 3 Convert the expression (True && False) || !(False || True) to postfix expression. Show the contents of the stack at every step. Question 4 Use a stack to evaluate the following postfix expression and show the content of the stack after execution of each operation. Don't write any code. Assume as if you are using push and pop member functions of the stack. AB-CD+E*+ (where A=5, B=3, C=5, D =4, and E=2) Question 5 Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : 50,40,+,18, 14,-, *,+ Question 6 Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : TRUE, FALSE, TRUE, FALSE, NOT, OR, TRUE, OR, OR, AND Question 7 Write a program for creating polynomial using linked list? Question 8 Each node of a STACK contains the following information, in addition to required pointer field : i) Roll number of the student ii) Age of the student Give the structure of node for the linked stack in question TOP is a pointer which points to the topmost node of the STACK. Write...
Words: 357 - Pages: 2
...Question 1: (5 marks) Write a program in C++ using linked list to manage information about persons. Variables used to store information about a person are: • name - the name of a person (character string). • age - the age of a person (integer value). You should write the MyList class, which is a linked list data structure to store person information. The following functions should be included in the MyList class: • void addLast(string xName, int xAge) - check if the first letter of xName is not 'B' (i.e. xName.at(0) != 'B') then add new person with name=xName, age=xAge to the end of the list. • void addFirst(string xName, int xAge) - check if the first letter of xName is not 'B' then add new person with name=xName, age=xAge to the begining of the list. • void ftraverse(ofstream &fou) - display all nodes in the file fou in format: (name, age). This function is given. • void f1() – Test addLast function. You do not need to edit this function. Your task is to complete the function addLast(string xName, int xAge) function only. With the given data, the content of the file f1.txt must be the following:: (A0,9) (A7,13) (A5,7) (A3,11) (A4,9) (A2,12) (A6,5) (A1,6) • void f2() – Test addFirst function. You do not need to edit this function. Your task is to complete the function addFirst(string xName, int xAge) function only. With the given data, the content of the file f2.txt must be the following:: (A1,6)...
Words: 344 - Pages: 2