INSTRUCTIONS: All problems should be written using JustBASIC. The code should be typed into the JustBASIC...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
INSTRUCTIONS: All problems should be written using JustBASIC. The code should be typed into the JustBASIC editor and executed. At the end of each solution, you should state whether the code executed and whether it produced correct results. Failure to follow directions will result in a zero for the assignment. 1. 2. 3. Write the beginning of the program that will create five arrays of the type and name listed below. Get the number of movies to be entered into the database from the user. Be sure to initialize the arrays. STRING actorLastName STRING actorFirstName STRING nameOfMovie NUM year OfDebut NUM grossearnings Add to the previously written code the part that will allow the user to populate the arrays. Using the previously written code, add pseudocode that will search for the actor's last name. You will ask the user for the last name to be searched for. You can assume all last names are unique (no repeats). If the name is present, your program will return the string "Target found" to the user. If the name is not found, the program will return the string "This actor is not in the database" only once just before the program terminates. STRING actorLastName STRING actorFirstName STRING nameOfMovie NUM year Of Debut NUM grossearnings INSTRUCTIONS: All problems should be written using JustBASIC. The code should be typed into the JustBASIC editor and executed. At the end of each solution, you should state whether the code executed and whether it produced correct results. Failure to follow directions will result in a zero for the assignment. 1. 2. 3. Write the beginning of the program that will create five arrays of the type and name listed below. Get the number of movies to be entered into the database from the user. Be sure to initialize the arrays. STRING actorLastName STRING actorFirstName STRING nameOfMovie NUM year OfDebut NUM grossearnings Add to the previously written code the part that will allow the user to populate the arrays. Using the previously written code, add pseudocode that will search for the actor's last name. You will ask the user for the last name to be searched for. You can assume all last names are unique (no repeats). If the name is present, your program will return the string "Target found" to the user. If the name is not found, the program will return the string "This actor is not in the database" only once just before the program terminates. STRING actorLastName STRING actorFirstName STRING nameOfMovie NUM year Of Debut NUM grossearnings
Expert Answer:
Answer rating: 100% (QA)
Step 1 Overview The question has asked to write a program in visual basic related to arrays Step 2 Create five arrays and get the number of movies fro... View the full answer
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these programming questions
-
Lavender Manufacturing Company began business in the current year. The company uses the simplified method to allocate mixed services costs to production. The company's costs and expenses for the year...
-
Create a project, in your language of study that meets the following requirements: o Create a record object (also known as entity object, data-transfer object) that uses the column names from the...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
In the United States, the production of ethanol fuel from corn is subsidized. Use bid rent function analysis to suggest what effects this subsidy might be expected to have on land use.
-
A solid copper sphere of radius 15.0 cm carries a charge of 40.0 nC. Find the electric field (a) 12.0 cm, (b) 17.0 cm, and (c) 75.0 cm from the center of the sphere (d) What If? How would your...
-
Some bones discovered in a crypt in Guatemala are carbon-dated. The 14C activity of the bones is measured to be 0.242 Bq per gram of carbon. Approximately how old are the bones?
-
Among 100 fish caught in a large lake, 18 were inedible due to the pollution of the environment. If we use \(\frac{18}{100}=0.18\) as an estimate of the corresponding true proportion, with what...
-
On January 1, 2014, Cayce Corporation acquired 100 percent of Simbel Company for consideration paid of $126,000, which was equal to fair value. Cayce is a U.S.-based company headquartered in Buffalo,...
-
The chief financial officer of a hospital wants to evaluate the year-to-year change in expenses by area. What areas had the highest and lowest growth, and what recommendations would you give the CFO...
-
1. If topaz is harder than quartz, then it will scratch quartz and also feldspar. Topaz is harder than quartz and it is also harder than calcite. Therefore, either topaz will scratch quartz or it...
-
Provide an example of a completed post trail validation tool for TAE 40116 Assessment cluster.
-
Consider a three generator system with IC3 (PG1) 18+0.03PG12 TL/MWh, IC(Paz)=15+0.02PG2-A TL/MWh, Ici (PG3) = 20 +0.02PG3 = TL/MWh, and with constraint PG1+PG2 +PG3 = 900.0
-
1 offers a 6% annual interest rate, but charges a $1 service charge each year, including the year when the account was opened. Bank #2 offers a 5% annual interest rate, and has no annual service...
-
Only Looking for help for the two main charts. Could you also please include the excel formulas for the charts as well. Thank yoy sarah wants to start her own business in 10 years. she needs to...
-
(d) Assume that X = 1 if Z z* and X = 0 if Z < z*. Then the regression discontinuity estimate of the effect of X on Y is equal to lim E(Y | Z = z) lim E(Y | Z = z). 27z* Which potential outcome is...
-
3) The following two cash flows Cash Flow (A) and Cash Flow (B) are economically equivalent. The effective interest rate is 10% per period. Please follow the questions to find out the unknown X. (15...
-
12 men or 18 women can reap a field in 14 days. The number of days that 8 men and 16 women will take to reap it is : a. 5 b. 7 c. 8 d. 9
-
If someone's Z-score for a variable was 0.67. Their score is a significant extreme score. Their score is not significant. O Their score is slightly above average. O Their score is an outlier.
-
I. Analyze the two most common methods of encrypting plaintext: bit stream and block cipher. II. Review that in the bit stream method, each bit in the plaintext is transformed into a cipher bit one...
-
Explain why a SDLC is a methodology and its purpose for an information system.
-
Which algorithm was the first public-key encryption algorithm developed (in 1977) and published for commercial use? a. 3DES b. Blowfish c. RSA d. Diffle-Hellman
-
This exercise considers data from the Medical Expenditure Panel Survey (MEPS) described in Exercise 1.1 and Section 11.4. Our dependent variable consists of the number of outpatient (COUNTOP) visits....
-
This exercise considers the data described in the Section 13.2.2 ratemaking classification example using data in Table 13.3 Table 13.3 . a. Fit a gamma regression model using a log-link function with...
-
Verify that the Tweedie distribution is a member of the linear exponential family of distributions by checking equation (13.9). In particular, provide an expression for \(S(y, \phi)\) (note that...
Study smarter with the SolutionInn App