subject

For this computer assignment, you are to write a C++ program to generate random integers in the range [ LOW = 1, HIGH = 10000 ] and to store them in a vector < int > of size VEC_SIZE = 250. Then, sort the contents of the vector (in ascending order) and display it on stdout. To sort the contents of a vector, use the sort ( ) function in the STL. In addition to the main ( ) routine, implement the following subroutines in your program: • void genRndNums ( vector < int >& v ) : This routine generates VEC_SIZE integers and puts them in vector v. Initializes the random number generator (RNG) by calling the function srand ( SEED ) with the seed value SEED = 1 and generates random integers by calling the function rand ( ).
• void printVec ( const vector < int >& v ) : This routine displays the contents of vector v on stdout, printing exactly NO_ITEMS = 12 numbers on a single line, except perhaps the last line. The sorted numbers need to be properly aligned on the output. For each printed number, allocate ITEM_W = 5 spaces on stdout.
Programming Notes:
• You are not allowed to use any I/O functions from the C library, such as scanf or printf. Instead, use the I/O functions from the C++ library, such as cin or cout.
• Name your source file as prog1.cc and your header file as prog1.h. Guard the statements in your header file using the following format. (This is necessary because you don’t want the statements in a header file are processed more than once.) #ifndef A-CONST-VALUE // should not be defined any place else #define A-CONST-VALUE // same const value as for ifndef directive // put all statements for your header file here #endif
• Include all system header files (that you need in your program) in your header file. For example, to gain access to the iostream library, which defines a set of simple I/O operations, insert the line #include in your header file, to gain access the I/O manipulators such as setw, insert the line #include in your header file; to access the vector container in the STL, insert the line #include in your header file; and to use the functions in the Randomly Generated Integers 2 STL such as sort, insert the line #include in your header file. At the top of your source file, insert your header file by the following statement: #include "prog1.h".
• To compile and link your program with the system library routines execute: Make N=1. (Assuming you’ve already a link to the script Make in directory: ~cs340/bin from your bin directory.) To test your program, execute: Make execute N=1. This command executes your program and displays its output as well as any error messages both on the terminal screen and in prog1.out. After you are done with the program, you don’t need its object and executable files any more. To delete them, execute: Make clean.
• Let v be a vector of integers, then the call: sort ( v. begin ( ), v. end ( ) ) sorts the elements of v in ascending order. The detailed description of the sort ( ) routine can be found on the course website and in the course textbook.
• Execute the srand ( SEED ) function (only once) before generating the first random integer with the seed value SEED. The rand ( ) function generates a random integer in the range [ 0, RAND_MAX ], where the constant value RAND_MAX is the largest random integer returned by the rand ( ) function and its value is system dependent. To normalize the return value to a value in the range [ LOW, HIGH ], execute: rand ( ) % ( HIGH – LOW + 1 ) + LOW.

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 03:50, TheViperMlg23676
You are working as a security analyst in a company xyz that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. while monitoring the data, you find a high number of outbound connections. you see that ip's owned by xyz (internal) and private ip's are communicating to a single public ip. therefore, the internal ip's are sending data to the public ip. after further analysis, you find out that this public ip is a blacklisted ip, and the internal communicating devices are compromised. what kind of attack does the above scenario depict?
Answers: 3
image
Computers and Technology, 22.06.2019 22:00, delawdermia27
Researchers measured the data speeds for a particular smartphone carrier at 50 airports. the highest speed measured was 78.1 mbps. the complete list of 50 data speeds has a mean of x overbarequals16.11 mbps and a standard deviation of sequals18.65 mbps. a. what is the difference between carrier's highest data speed and the mean of all 50 data speeds? b. how many standard deviations is that [the difference found in part (a)]? c. convert the carrier's highest data speed to a z score. d. if we consider data speeds that convert to z scores between minus2 and 2 to be neither significantly low nor significantly high, is the carrier's highest data speed significant? a. the difference is nothing mbps.
Answers: 3
image
Computers and Technology, 23.06.2019 03:00, Julianhooks
State 7 common key's for every keyboard
Answers: 1
image
Computers and Technology, 24.06.2019 03:00, 2020IRodriguez385
With editing, word automatically displays a paste options button near the pasted or moved text. a. cut-and-paste b. drag-and-drop c. inline d. copy-and-carry
Answers: 1
You know the right answer?
For this computer assignment, you are to write a C++ program to generate random integers in the rang...

Questions in other subjects:

Konu
History, 16.10.2020 17:01
Konu
English, 16.10.2020 17:01