IN JS ONLY NEEDED SOLUTION Create a function that takes an amount of monetary change (e.g. 47 cents) and breaks down the most efficient way that change can be made using USD quarters, dimes, nickels and pennies. Your function should return an object. Coin Value Penny 0.01 Nickel 0.05 Dime 0.10 Quarter 0.25 Examples makeChange (47) → { "q": 1, makeChange (24) { "q": 0, makeChange (92) - { "q": 3, SI "d": 2, "n": 0, "p": 2 } "d": 2, "n": 0, "p": 4 } "d": 1, "n": 1, "p": 2 }
Q: To what extent can you describe the effects of a breach in cloud security? What do you believe are…
A: Introduction: A data breach is when sensitive information gets into the hands of someone who…
Q: Discuss OS protection risks, at least 4 risks.
A: OS protection: Protection refers to mechanisms that control program, process, or user access to…
Q: Which steps in developing most heavily to guarantee Explain. a compiler must be prioritized a…
A: Compiler optimisation: An optimising compiler is a piece of computer software that aims to minimise…
Q: governance, along with the Make a list of the top five areas or fields of internet internet-related…
A: The solution for the above given question is given below:
Q: How can forensics teams access information stored on Windows computers?
A: Clarification: Volatile data and nonvolatile data are the two sorts of information that laptop…
Q: Using SQL data definition language, write the SQL statements to change each of the following…
A: i. Query to Remove customer name: ALTER TABLE customer DROP COLUMN customername; Query to add…
Q: Explain how the physical design of a database system is a key factor in complying with compliance…
A: Introduction Due to the exponential growth in E-commerce and online activities involving Personally…
Q: ) Complete the simulation table accordingly. b) Assume a M/M/1 queue configuration, define the…
A: i). The average time a voter spends waiting to vote. 1/12=0.0833 Since there are twelve entry in…
Q: Communications protocols for exchanging information. The problems that might arise while using TCP…
A: Solution: Transport layer protocols typically handle point-to-point communication, which involves…
Q: How can you protect your computer from power surges?
A: The best method for protecting your computer from harm brought on by an increase in electrical…
Q: Detail the primary Java interfaces used by the collections framework.
A: The Java collections framework provides a set of interfaces and classes to implement various data…
Q: Whether or not a data breach affects cloud security depends on the specifics of the situation. Some…
A: Data breach damage cloud security: Dangers? Can things be improved Impact. Unauthorized access to…
Q: 1. Consider a set of four data points: f(0) = 3, f(4) = -2, f(-1) = 2, and f(1) = 1. In the…
A: Answer is in next step. please give a like !
Q: Describe where the blockchain is stored , types of the records that are present in the blockchain…
A: As we want to store the record of the transactions hence the blockchain basically store the flat…
Q: wing tables support the database of a shopping store. The schema contains four tables i.e. Customer,…
A: let us see the answer Since you have asked multiple questions we will answer 2 of them if you want…
Q: How can you protect your computer against electrical surges, and what else can you do to ensure its…
A: Statement: Power surges are the sudden spikes in the energy power that is sent to typical appliances…
Q: Find Electromagnetic Harvesters implementations over the internet and describe how they work and…
A: The question has been answered in step2
Q: Provide an explanation of what it means for neural networks to "learn" in the context of computer…
A: Typically, neural networks perform supervised learning tasks, which include learning from data sets…
Q: How may of each type of subnet size did you need? include the unallocated subnet si
A: Here is the solution:
Q: How can you ensure the safety of your computer against other potential dangers, such as power…
A: STATEMENT: Power surges are abrupt spikes in energy levels. energy supplied to a device. standard…
Q: After this pause, we'll go deep into the topic of application layer protocols and network programs.
A: Applications that run on a network: As network functions progressively become virtualized and…
Q: I was wondering if you could elaborate on the Class C IP address
A: The correct answer for the above question is given in the following steps.
Q: Explain Full form of SATA hard disk?
A:
Q: Using SQL data definition language, write the SQL statements to change each of the following…
A: Here are all the Queries for all the tasks:
Q: 450005dc 1e244000 8006... is a piece of information in an IP datagram header (in hexadecimal)
A: The header size is 20 bytes.
Q: Please share your thoughts on the advantages and disadvantages of cloud storage.
A: The following are some of the benefits of storing data in the cloud: 1) When you save the data on…
Q: What impact has the internet had on the development of different kinds of systems?
A: Corporate businesses, industries, and organisations have all been significantly altered by the…
Q: In what sense is a computer "programmed?" Which criteria are most important when deciding on a…
A: A computer program consists of code that is executed on a computer to perform particular tasks. This…
Q: A multiprocessor with eight processors has 20 attached tape drives. There is a large number of jobs…
A: operating system An operating system goes about as a go-between between the user of a PC and PC…
Q: There is an N of components, represented by the strings S1,S2, .... SN into the kitchen. The chef…
A: Input-Output Format: The first line of the input contains a single integer T denoting the number of…
Q: How do you create a variable with the floating number 2.8? O a. float x 2.8f O b. byte x 2.8f; Oc. x…
A:
Q: The prevalence of cybercrimes is increasing globally. Identify and explain five techniques which…
A: Secure your hardwareWith so much attention given to acquiring the newest and most sophisticated…
Q: Why is it problematic when information systems aren't linked together?
A: The four main areas of concern are operations, cost, design, and data. A system failure can be…
Q: Which statement(s) regarding the following code is/are correct? Student s1 = new Student ("Alex",…
A: The correct output is:
Q: How many different ways are there for us to communicate with one another internet? The structure of…
A: INTRODUCTION: Before we can grasp the internet, we must first understand the prior communication…
Q: Can cloud security policies be affected by data breaches
A: Yes, cloud security policies can be affected by data breaches. A data breach is defined as "a…
Q: Use the pumping lemma to show that the following languages are not context-free. (a) (0"1"0"1" In>0}…
A: a)Given L = {0^n 1^n 0^n 1^n | n>=0} L is not CFL: proof using pumping lemma: let take string z…
Q: Do you understand the thought process behind making a piece of software? When selecting a…
A: Software is a bunch of directions, information or projects used to work PCs and execute explicit…
Q: Find (49.3)10 - (00110110.0010), BCD = (?), ВС
A: The answer is
Q: A palindrome is a string that reads in the same way left-to-right and right-to-left. How many bit…
A: Given A palindrome is a string that reads, in the same way, left-to-right and right-to-left. We need…
Q: Someone has attempted to censor my strings by replacing every vowel with a *, 1*k* th*s. Luckily,…
A: Algorithm - Take input from the user. Now use the below logic - for (let i=0;i<vowels.length;…
Q: Why is it problematic when information systems aren't linked together?
A: SOLUTION : When information systems aren't linked together .. After years of neglect, the former…
Q: What happens if an adversary tampers with a transmission while it is in transit by altering the Tag…
A: STATEMENT: The tag stands for "message authentication code," a bit of data that is sent between…
Q: It's crucial to understand the significance of each phase of the compiler's execution. For the best…
A: INTRODUCTION: A compiler is a piece of software used to transform computer code from one…
Q: The question is how much damage data breaches to the security of the cloud might do. Can we undo the…
A: Introduction To Data Breach When information is taken from a system without the owner's knowledge or…
Q: th a number of parameters to find a system which learns with sufficient accuracy but without…
A: Introduction: The Test dataset serves as the gold standard for evaluating the model. It is only used…
Q: Whether or not a data breach affects cloud security depends on the specifics of the situation. Some…
A: Introduction:Cloud leakageA data breach occurs when secure/confidential information is released into…
Q: Please explain scanf(drawbacks) and how they may be prevented.
A: "scanf" is a function in the C programming language that accepts user input of any type, including…
Q: Is it true that no one has ever succeeded to launch a DDoS attack?
A: What is DDoS attack? DDoS Attack, also known as a "Distributed Denial-of-Service (DDoS) Attack," is…
Q: When designing a compiler, what factors should be prioritized to provide a high-quality, reliable…
A: Optimizing compilers: An optimizing compiler is a piece of computer software that seeks to decrease…
Step by step
Solved in 2 steps with 1 images
- IN JS ONLY NEEDED SOLUTION Create a function that takes an amount of monetary change (e.g. 47 cents) and breaks down the most efficient way that change can be made using USD quarters, dimes, nickels and pennies. Your function should return an object. Coin Value Penny 0.01 Nickel 0.05 Dime 0.10 Quarter 0.25 Examples makeChange (47) → { "q": 1, "d": 2, "n": 0, "p": 2 } makeChange (24) → { "q": 0, "d": 2, "n": 0, "p":4} makeChange (92) { "q": 3, "d": 1, "n": 1, "p": 2 } SComputer Science Write in Javascript please and use high order functions liek map or filter or reduce let obj = [ { mode: "hot" }, { temp: "low" }, { mode: "cold } ] I want to create a function that get object by key such as: myFunc("mode"); returns { mode: "hot" } next call of myFunc("mode") returns { mode: "coldIn C++, define a “Conflict” function that accepts an array of Course object pointers. It will return two numbers:- the count of courses with conflicting days. If there is more than one course scheduled in the same day, it is considered a conflict. It will return if there is no conflict.- which day of the week has the most conflict. It will return 0 if there is none. Show how this function is being called and returning proper values. you may want to define a local integer array containing the count for each day of the week with the initial value of 0.Whenever you have a Course object with a specific day, you can increment that count for that corresponding index in the schedule array.
- Using c++ In main.cpp, complete the function RollSpecificNumber() that takes in three parameters: a GVDie object, an integer representing a desired face number of a die, and an integer representing the goal amount of times to roll the desired face number. The function RollSpecificNumber() then rolls the die until the desired face number is rolled the goal amount of times and returns the number of rolls required. Note: For testing purposes, the GVDie objects are created in the main() function using a pseudo-random number generator with a fixed seed value. The program used during development uses a seed value of 15, but when submitted, different seed values will be used for each test case. Refer to the textbook section on random numbers to learn more about pseudo-random numbers. Ex: If the GVDie objects are created with a seed value of 15 and the input of the program is: 3 20 the output is: It took 140 rolls to get a "3" 20 times. #include <iostream>#include "GVDie.h"using…Using c++ Rolling for a pair Given two GVDie objects that represent 2 six-sided dice and an integer that represents a desired value as parameters, complete the function RollingForPair() in the main class. The main class rolls the dice until a pair with the desired value is rolled. The function RollingForPair() then returns the number of rolls thrown to achieve the result. Assume the desired value received from input is within the appropriate range, 1-6. Note: For testing purposes, the GVDie objects are created in the main() function using a pseudo-random number generator with a fixed seed value. The program uses a seed value of 15 during development, but when submitted, a different seed value will be used for each test case. Refer to the textbook section on random numbers to learn more about pseudo-random numbers. Ex: If the GVDie objects are created with a seed value of 15 and the input of the program is: 2 the output is: It took 82 rolls to get a pair of 2's. #include…Define an enumeration type triangleType that has the values scalene, isosceles, equilateral, and noTriangle. Write a function triangleShape that takes as parameters three numbers, each of which represents the length of a side of the triangle. The function should return the shape of the triangle. (Note: In a triangle, the sum of the lengths of any two sides is greater than the length of the third side.) Write a program that prompts the user to input the length of the sides of a triangle and outputs the shape of the triangle
- Define an enumeration type, triangleType, that has the values scalene, isosceles, equilateraland noTriangle. Write a function triangleShape that takes as parameters three numbers, each of which represents the length of a side of the triangle. The function should return the shape of the triangle. (Note, ina triangle, the sum of the lengths of any two sides is greater than the length of the third side). Write a program that prompts the user to input the length of the sides of a triangle and outputs the shape of the triangle. The user can enter the sides in no particular order. C++For all WWPD questions, type Function if you believe the answer is , Error if it errors, and Nothing if nothing is displayed. As a reminder, the following two lines of code will not display anything in the Python interpreter when executed: >>> x = None >>> X >>> lambda x: x #A lambda expression with one parameter x >>> a = lambda x: x # Assigning the lambda function to the name a >>> a (5) >>> (lambda: 3) () # Using a lambda expression as an operator in a call exp. >>> b = lambda x: lambda: x # Lambdas can return other lambdas! >>> c= b (88) >>> C >>> c() >>> d= Lambda f: f(4) # They can have functions as arguments as well. >>> def square(x): return x * X >>> d (square) >>> Z = 3 >>> e = Lambda x: lambda y: lambda: x >>>e (0) (1) () >>> f = Lambda z: x + Z >>> f (3) >>> higher_order_lambda = Lambda f: Lambda x: f(x) >>> g = Lambda x: x* x >>> higher_order_lambda (2) (g) # Which argument belongs to which function call? >>> higher_order_lambda (g) (2) + Z >>> call_thrice = lambda f:…In JAVA A function foo takes three integers as input arguments, i.e., foo(int a, int b, int c). The three inputs represent the three sides of a triangle in centimeter. The function is expected to return the type of a triangle: “equilateral”, “isosceles”, or “scalene”. Assume the domains of the three variables are 1 ≤ a ≤ 100, 50 ≤ b ≤ 150 and 100 ≤ c ≤ 200, respectively. A test case is in a tuple format <a, b, c, expected_output> with test inputs and the expected output. S1 is a set of test cases for the “Boundary Value Analysis” approach. S1 = S2 is a set of test cases for the “Robustness testing” approach. S2 – S1 = S3 is a set of tests cases for the “Robust Worst-Case testing” approach. Are there any types of triangles that S3 cannot reveal? If yes, what are they? If no, why?
- IN C++ USING CLASS Write a program in C++ that implements the game tic-tac-toe: Tic-Tac-Toe is a game played on a three-by-three board. Two players, X and O, alternate in placing their respective marks in the cells of this board, starting with player X. If either player succeeds in getting three of his or her marks in a row, column, or diagonal, then that player wins. In this homework, you should use the OOP concepts to implement the tic-tac-toe gameWrite in C++ Alice is trying to monitor how much time she spends studying per week. She going through her logs, and wants to figure out which week she studied the least, her total time spent studying, and her average time spent studying per week. To help Alice work towards this goal, write three functions: min(), total(), and average(). All three functions take two parameters: an array of doubles and the number of elements in the array. Then, they make the following computations: min() - returns the minimum value in the array sum() - returns the sum of all the values in the array average() - returns the average of all the values in the array You may assume that the array will be non-empty. Function specifications: Function 1: Finding the minimum hours studied Name: min() Parameters (Your function should accept these parameters IN THIS ORDER): arr double: The input array containing Alice's study hours per week arr_size int: The number of elements stored in the array Return Value:…thello is a board game and you are expected to implement the move function for this game. Arguments passed to the function are - a symbol of the player making the move and x y coordinates of the cell at which the player wishes to make the move. The move function will be returning a boolean, false - if the move isn't feasible and true - if the move is feasible and this function will also make the move then i.e. make the required changes in the board. Input Format: Line 1: Integer n (Total number of moves) Line 2: Player 1 coordinates, x and y (Two integers separated by space) Line 3: Player 2 coordinates, x and y (Two integers separated by space) Note 1: Number of moves (i.e. n) is always even and Player 1 always starts the game. Note 2: If any player's coordinates are not valid, enter again till the right move. Main function is given for you reference. Sample Input: 2 24 15 25 Sample Output: 00000000 00000000 00001000 00011000 00021000 00000000 00000000 00000000 false 00000000 00000000…