Hope this is correct
HAVE A GOOD DAY!
Although slow start with congestion avoidance is an effective technique for coping with congestion, it can result in long recovery times in high-speed networks, as this problem demonstrates.
A) Assume a round-trip delay of 60 msec (about what might occur across the continent) and a link with an available bandwidth of 1 Gbps and a segment size of 576 octets. Determine the window size needed to keep the pipeline full and the a worst case estimate of the time it will take to reach that window size after a timeout occurs on a new connection using Jacobson’s slow start with congestion avoidance approach.
B) Repeat part (a) for a segment size of 16 kbytes.
Answer:
The answer to this question can be defined as follows:
In option A: The answer is "13020".
In option B: The answer is "468 Segments".
Explanation:
Given:
The value of round-trip delay= 60 m-second
The value of Bandwidth= 1Gbps
The value of Segment size = 576 octets
window size =?
Formula:
[tex]\text{Window size =} \frac{(\text{Bandwidth} \times \text{round} - \text{trip time})}{(\text{segment size window })}[/tex]
[tex]=\frac{10^9 \times 0.06}{576 \times 8}\\\\=\frac{10^9 \times6}{576 \times 8\times 100}\\\\=\frac{10^7 \times 1}{96 \times 8}\\\\=\frac{10^7 \times 1}{768}\\\\=13020.83[/tex]
So, the value of the segments is =13020.833 or equal to 13020
Calculating segments in the size of 16 k-bytes:
[tex]\text{Window size} = \frac{10^9 \times 0.06}{16,000 \times 8}[/tex]
[tex]= \frac{10^9 \times 0.06}{16,000 \times 8}\\\\ = \frac{10^9 \times 6}{16,000 \times 8 \times 100}\\\\ = \frac{10^4 \times 3}{16 \times 4}\\\\ = \frac{30000}{64 }\\\\=468.75[/tex]
The size of 16 k-bytes segments is 468.75 which is equal to 468.
var tax = .07;
var getCost = function(itemCost, numItems) {
var subtotal = itemCost * numItems;
var tax = 0.06;
var total = subtotal + subtotal * tax;
return (total);
}
var totalCost = getCost(25.00, 3);
alert("Your cost is $" + totalCost.toFixed(2) + " including a tax of " +
tax.toFixed(2));
Which variable represents the function expression?
a. totalCost
b. getCost
c. itemCost
d. total
Answer:
b. getCost
Explanation:
Javascript is a multi-purpose programming language, used in applications like web development, software development and embedded system programming, data visualization and analysis, etc.
Its regular syntax defines variables with the "var" keyword and with additional ecmascript rules, the "let" and "const" keywords as well. function definition uses the keyword "function" with parenthesis for holding arguments. The code block of a function is written between two curly braces and returns a value stored in a variable with the return keyword.
The variable can now be called with the parenthesis and required arguments. Note that only anonymous functions can assigned to a variable.
Which octet of the subnet mask 255.255.255.0 will tell the router the corresponding host ID?The last octetThe first octetThe first and last octetThe middle two octets
Answer:
The last octet
Explanation:
Here in the question, given the sub net mask, we want to know which octet of the subnet mask will tell the router the corresponding host ID.
The correct answer to this is the last octet. It is the last octet that will tell the router the corresponding host ID
Determine the median paycheck from the following set:
{$100, $250, $300, $400, $600, $650}
$300
$350
$450
$600
Answer:
My answer to the question is $350.
The middle numbers are $300&$400.
300+400=700/2=350.
Answer:
$350
Explanation:
What is the quick key to highlighting a column?
Ctrl + down arrow
Ctrl + Shift + down arrow
Right-click + down arrow
Ctrl + Windows + down arrow
The quick key to highlighting a column is the Ctrl + Shift + down arrow. Thus, option (b) is correct.
What is column?The term column refers to how data is organized vertically from top to bottom. Columns are groups of cells that are arranged vertically and run from top to bottom. A column is a group of cells in a table that are vertically aligned. The column is the used in the excel worksheet.
The quick key for highlighting a column is Ctrl + Shift + down arrow. To select downward, press Ctrl-Shift-Down Arrow. To pick anything, use Ctrl-Shift-Right Arrow, then Ctrl-Shift-Down Arrow. In the Move/Highlight Cells, the was employed. The majority of the time, the excel worksheet was used.
As a result, the quick key to highlighting a column is the Ctrl + Shift + down arrow. Therefore, option (b) is correct.
Learn more about the column, here:
https://brainly.com/question/3642260
#SPJ6
Answer:
its (B) ctrl+shift+down arrow
hope this helps <3
Explanation:
Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. Sample output with inputs: 4.5 2.1 3.0
Answer:
def pyramid_volume(base_length,base_width,pyramid_height):
return base_length * base_width * pyramid_height/3
length = float(input("Length: "))
width = float(input("Width: "))
height = float(input("Height: "))
print("{:.2f}".format(pyramid_volume(length,width,height)))
Explanation:
This line declares the function along with the three parameters
def pyramid_volume(base_length,base_width,pyramid_height):
This line returns the volume of the pyramid
return base_length * base_width * pyramid_height/3
The main starts here
The next three lines gets user inputs for length, width and height
length = float(input("Length: "))
width = float(input("Width: "))
height = float(input("Height: "))
This line returns the volume of the pyramid in 2 decimal places
print("{:.2f}".format(pyramid_volume(length,width,height)))
Draw the binary search tree that results from starting with an empty tree and
a. adding 50 72 96 94 26 12 11 9 2 10 25 51 16 17 95
b. adding 95 17 16 51 25 10 2 9 11 12 26 94 96 72 50
c. adding 10 72 96 94 85 78 80 9 5 3 1 15 18 37 47
d. adding 50 72 96 94 26 12 11 9 2 10, then removing 2 and 94
e. adding 50 72 96 94 26 12 11 9 2 10, then removing 50 and 26
f. adding 50 72 96 94 26 12 11 9 2 10, then removing 12 and 72
Answer:
See the attached document for answer.
Explanation:
See the attached document for the explanation.
Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a foot. Sample output with inputs: 58 Total inches: 68 def print_total_inches (num_feet, hum_inches): 2 str1=12 str2=num_inches 4 print("Total inches:',(num_feet*strl+str2)) 5 print_total_inches (5,8) 6 feet = int(input) 7 inches = int(input) 8 print_total_inches (feet, inches)
I'll pick up your question from here:
Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a foot.
Sample output with inputs: 5 8
Total inches: 68
Answer:
The program is as follows:
def print_total_inches(num_feet,num_inches):
print("Total Inches: "+str(12 * num_feet + num_inches))
print_total_inches(5,8)
inches = int(input("Inches: "))
feet = int(input("Feet: "))
print_total_inches(feet,inches)
Explanation:
This line defines the function along with the two parameters
def print_total_inches(num_feet,num_inches):
This line calculates and prints the equivalent number of inches
print("Total Inches: "+str(12 * num_feet + num_inches))
The main starts here:
This line tests with the original arguments from the question
print_total_inches(5,8)
The next two lines prompts user for input (inches and feet)
inches = int(input("Inches: "))
feet = int(input("Feet: "))
This line prints the equivalent number of inches depending on the user input
print_total_inches(feet,inches)
Answer:
Written in Python:
def print_total_inches(num_feet,num_inches):
print("Total inches: "+str(12 * num_feet + num_inches))
feet = int(input())
inches = int(input())
print_total_inches(feet, inches)
Explanation:
Karl from Accounting is in a panic. He is convinced that he has identified malware on the servers—a type of man-in-the-middle attack in which a Trojan horse manipulates calls between the browser and yet still displays back the user's intended transaction. What type of attack could he have stumbled on?
Answer:
The correct answer will be "Man-in-the-browser".
Explanation:
Man-in-the-browser seems to be a category of person-in-the-middle attack where a certain Trojan horse tries to misrepresent calls between some of the web pages and therefore it is prevention systems while still demonstrating the intentional transfer of funds back to the customer.High-tech as well as high-amount technology for starting a man throughout the internet explorer assaults.A computer uses a programmable clock in square-wav e mode. If a 500 MHz crystal is used, what should be the value of the holding register to achieve a clock resolution of (a) a millisecond (a clock tick once every millisecond)
Answer:
500,000
Explanation:
A computer uses a programmable clock in square-wave mode. If a 500 MHz crystal is used, what should be the value of the holding register to achieve a clock resolution of (a) a millisecond (a clock tick once every millisecond)
1 millisecond = 1 million second = 1,000,000
For a 500 MHz crystal, Counter decrement = 2
Therefore value of the holding register to a clock resolution of 1,000,000 seconds :
1,000,000/2 = 500,000
Define a function group-by-nondecreasing, which takes in a stream of numbers and outputs a stream of lists, which overall has the same numbers in the same order, but grouped into segments that are non-decreasing.
Answer:
def group_by_nondecreasing( *args ) :
num_list = [arg for arg in args]
sorted_numlist = sorted( num_list )
list_stream = [ sorted_numlist, sorted_numlist, sorted_numlist ]
return list_stream
Explanation:
This python function has the ability to accept multiple and varying amount of arguments. the list comprehension shorten the logical for statement to generate a list of numbers, sorts the list in ascending order by default and duplicates the list in another list.
Enum fruit_tag {
BLUEBERRY,
BANANA,
PINEAPPLE,
WATERMELON
};
typedef enum fruit_tag fruit_t;
void printFruit(fruit_t myFruit) {
switch(myFruit) {
case BLUEBERRY:
printf("a blueberry");
break;
case BANANA:
printf("a banana");
break;
case PINEAPPLE:
printf("a pineapple");
break;
case WATERMELON:
printf("a watermelon");
break;
}
}
void compareFruit(fruit_t fruit1, fruit_t fruit2) {
if (fruit1 > fruit2) {
printFruit(fruit1);
printf(" is larger than ");
printFruit(fruit2);
}
else {
printFruit(fruit1);
printf(" is smaller than ");
printFruit(fruit2);
}
}
int main(void) {
fruit_t myFruit = PINEAPPLE;
fruit_t otherFruit = BLUEBERRY;
compareFruit(myFruit, otherFruit);
return 0;
What is the output?
Answer:
The output is "a pineapple is larger than a blueberry ".
Explanation:
In the given C language code Enum, typedef, and two methods "printfruit and compareFruit" is declared, that can be defined as follows:
In the enum "fruit_tag" there are multiple fruit name is declared that use as the datatypes. In the next line, the typedef is defined, that enum to define another datatype that is "fruit_t". In the next step, the printFruit method is defined that accepts "myFruit" variable in its parameter and use the switch case to to check value. In the "compareFruit" method, it accepts two parameters and uses the if-else block to check its parameters value and print its value. In the main method, two variable "myFruit and otherFruit" variable is declared that stores the values and pass into the "compareFruit" method and call the method.Define a function readList with one parameter, the (string) name of a file to be read from. The file consists of integers, one per line. The function should return a list of the integers in the file.
Answer:
Here is the Python function readList:
def readList(filename): #function definition of readList that takes a filename as a parameter and returns a list of integers in the file
list = [] # declares an empty list
with open(filename, 'r') as infile: # opens the file in read mode by an object infile
lines = infile.readlines() # returns a list with each line in file as a list item
for line in lines: #loops through the list of each line
i = line[:-1] # removes new line break which is the last character of the list of line
list.append(i) # add each list item i.e. integers in the list
return list #returns the list of integers
#in order to check the working of the above function use the following function call and print statement to print the result on output screen
print(readList("file.txt")) #calls readList function by passing a file name to it
Explanation:
The program is well explained in the comments mentioned with each line of the code.
The program declares an empty list.
Then it opens the input file in read mode using the object infile.
Next it uses readLines method which returns a list with each line of the file as a list item.
Next the for loop iterates through each item of the file which is basically integer one per line
It adds each item of list i.e. each integers in a line to a list using append() method.
Then the function returns the list which is the list of integers in the file.
The program along with it output is attached. The file "file.txt" contains integers 1 to 8 one per line.
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________. change your network name (SSID) enable SSID broadcast turn on security protocols create a passphrase
Answer:
Enable SSID broadcast
Explanation:
All of the following are extra precautions you can take to secure a wireless network except enable SSID broadcast. The correct option is B.
What is SSID broadcast?When people in the area try to join their wireless devices, the name of your network is listed in the list of available networks thanks to broadcasting the SSID.
You can stop SSID broadcasting if you don't want arbitrary wireless devices attempting to connect to your network.
Home networks don't need to have a visible SSID unless they have many access points that devices can switch between.
If your network just has a single router, disabling this function means giving up the ease of adding new home network customers in exchange for certain security gains.
Apart from enabling SSID broadcast, there are other security measures you may take to protect a wireless network.
Thus, the correct option is B.
For more details regarding SSID broadcast, visit:
https://brainly.com/question/13191413
#SPJ6
a reason for giving a Page Quality (PQ) rating of Highest, is it the page has no Ads?
Answer:
quality of highest giving page hash no adds
CHALLENGE ACTIVITY 3.1.2: Type casting: Computing average owls per zoo.
Assign avg_owls with the average owls per zoo. Print avg_owls as an integer. Sample output for inputs: 1 2 4
Average owls per zoo: 2
1. num owls zooA= 1
2. num owls zooB = 2
3. numowlszooC = 4 -
4. num-zoos = 3
5. avg-owls 0.0
6.
7. Your solution goes here" Run
8.
Answer:
num_owls_zooA = 1
num_owls_zooB = 2
num_owls_zooC = 4
num_zoos = 3
avg_owls = 0.0
avg_owls = (num_owls_zooA + num_owls_zooB + num_owls_zooC) / num_zoos
print("Average owls per zoo: " + str(int(avg_owls)))
Explanation:
Initialize the num_owls_zooA, num_owls_zooB, num_owls_zooC as 1, 2, 4 respectively
Initialize the num_zoos as 3 and avg_owls as 0
Calculate the avg_owls, sum num_owls_zooA, num_owls_zooB, num_owls_zooC and divide the result by num_zoos
Print the avg_owls as an integer (Type cast the avg_owls to integer, int(avg_owls))
Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer CPU
Answer:
mouse printer CPU touch screen
Explanation:
on a tablet computer hope this helps you :)
Consider the following calling sequences and assuming that dynamic scoping is used, what variables are visible during execution of the last function called? Include with each visible variable the name of the function in which it was defined.a. Main calls fun1; fun1 calls fun2; fun2 calls fun3b. Main calls fun1; fun1 calls fun3c. Main calls fun2; fun2 calls fun3; fun3 calls fun1d. Main calls fun3; fun3 calls fun1e. Main calls fun1; fun1 calls fun3; fun3 calls fun2f. Main calls fun3; fun3 calls fun2; fun2 calls fun1void fun1(void);void fun2(void);void fun3(void);void main() {Int a,b,c;…}void fun1(void){Int b,c,d;…}void fun2(void){Int c,d,e;…}void fun3(void){Int d,e,f;…}
Answer:
In dynamic scoping the current block is searched by the compiler and then all calling functions consecutively e.g. if a function a() calls a separately defined function b() then b() does have access to the local variables of a(). The visible variables with the name of the function in which it was defined are given below.
Explanation:
In main() function three integer type variables are declared: a,b,c
In fun1() three int type variables are declared/defined: b,c,d
In fun2() three int type variables are declared/defined: c,d,e
In fun3() three int type variables are declared/defined: d,e,f
a. Main calls fun1; fun1 calls fun2; fun2 calls fun3
Here the main() calls fun1() which calls fun2() and fun2() calls func3() . This means first the func3() executes, then fun2(), then fun1() and last main()
Visible Variable: d, e, f Defined in: fun3
Visible Variable: c Defined in: fun2 (the variables d and e of fun2
are not visible)
Visible Variable: b Defined in: fun1 ( c and d of func1 are hidden)
Visible Variable: a Defined in: main (b,c are hidden)
b. Main calls fun1; fun1 calls fun3
Here the main() calls fun1, fun1 calls fun3. This means the body of fun3 executes first, then of fun1 and then in last, of main()
Visible Variable: d, e, f Defined in: fun3
Visible Variable: b, c Defined in: fun1 (d not visible)
Visible Variable: a Defined in: main ( b and c not visible)
c. Main calls fun2; fun2 calls fun3; fun3 calls fun1
Here the main() calls fun2, fun2 calls fun3 and fun3 calls fun1. This means the body of fun1 executes first, then of fun3, then fun2 and in last, of main()
Visible Variable: b, c, d Defined in: fun1
Visible Variable: e, f Defined in: fun3 ( d not visible)
Visible Variable: a Defined in: main ( b and c not visible)
Here variables c, d and e of fun2 are not visible
d. Main calls fun3; fun3 calls fun1
Here the main() calls fun3, fun3 calls fun1. This means the body of fun1 executes first, then of fun3 and then in last, of main()
Visible Variable: b, c, d Defined in: fun1
Visible Variable: e, f Defined in: fun3 ( d not visible )
Visible Variable: a Defined in: main (b and c not visible)
e. Main calls fun1; fun1 calls fun3; fun3 calls fun2
Here the main() calls fun1, fun1 calls fun3 and fun3 calls fun2. This means the body of fun2 executes first, then of fun3, then of fun1 and then in last, of main()
Visible Variable: c, d, e Defined in: fun2
Visible Variable: f Defined in: fun3 ( d and e not visible)
Visible Variable: b Defined in: fun1 ( c and d not visible)
Visible Variable: a Defined in: main ( b and c not visible)
f. Main calls fun3; fun3 calls fun2; fun2 calls fun1
Here the main() calls fun3, fun3 calls fun2 and fun2 calls fun1. This means the body of fun1 executes first, then of fun2, then of fun3 and then in last, of main()
Visible Variable: b, c, d Defined in: fun1
Visible Variable: e Defined in: fun2
Visible Variable: f Defined in: fun3
Visible Variable: a Defined in: main
why you think Operating System is pivotal in teaching and learning.
Answer:
An Operating System is pivotal in teaching and learning because:
1. It enables computer users to communicate with the hardware.
2. To run any computer programme successfully, the Operating System is basic.
3. It provides a smooth interface for teachers to use video conferencing or other conferencing systems in teaching their students.
4. The OS enables the launching of other learning packages on a computer system.
5. Students can install learning apps on their systems with the help of the OS.
Explanation:
An Operating System is a software which brings about easy communication with the hardware and enablea other programs to run on the computer easily. It provides basic functionality in systems were they are installed.
Suppose that a class named ClassA contains a private nonstatic integer named b, a public nonstatic integer named c, and a public static integer named d. Which of the following are legal statements in a class named ClassB that has instantiated an object as ClassA obA =new ClassA();?
a. obA.b 12;
b. obA.c 5;
c. obA.d 23;
d. ClassA.b=23;
e. ClassA.c= 33;
f. ClassA.d= 99;
Answer:
b. obA.c 5;
d. ClassA.b=23;
f. ClassA.d = 99;
Explanation:
Java is a programming language for object oriented programs. It is high level programming language developed by Sun Microsystems. Java is used to create applications that can run on single computer. Static variable act as global variable in Java and can be shared among all objects. The non static variable is specific to instance object in which it is created.
On the Excel Ribbon, click the Data tab in the Sort & Filter Group, and then click the Sort button to conduct a _____ sort. a. table range b. pivot table c. auto sum d. multiple column
Answer:
a. Table range
Explanation:
Excel is used for maintaining the data of the company. It contains various formulas, features like pivot table, macros, sort & filter group so the firm could able to present its data in an effective and efficient way
Here the sort button is used to ascending or descending the table based on the name, values, etc
So in the given situation, the first option is correct
Answer:
Datasheet, aecending, home
Explanation:
If our HMap implementation is used (load factor of 75% and an initial capacity of 1,000), how many times is the enlarge method called if the number of unique entries put into the map is:_______
a. 100
b. 750
c. 2,000
d. 10,000
e. 100,000
Answer:
A) for 100 : < 1 times
b) for 750 : < 1 times
c) For 2000 = 1 time
D) for 10000 = 4 times
E) for 100000 = 7 times
Explanation:
Given data:
load factor = 75%
initial capacity = 1000
The number of times the enlarge method will be called for a unique number of entries would be 2 times the initial capacity ( 1000 ) because the load factor = 75% = 0.75
A) for 100 : < 1 times
b) for 750 : < 1 times
C) For 2000
= initial capacity * 2 = 2000 ( 1 time )
D) for 10000
= 1000 * 2 *2 *2*2 = 16000 ( 4 times )
to make it 10000 we have to add another 2000 which will make the number of times = 4 times
E)for 100000
= 1000*2*2*2*2*2*2*2= 128000 ( 7 times )
unique entry of 100000 is contained in 7 times
what privacy risks do new technologies present,
and how do we decide if they're worth it?
Answer:
Los riesgos de las nuevas tecnologías se multiplican a medida que nos hacemos dependientes de ellas. También lo hacen a medida que sustituyen a otras formas de contacto social más cercanas
Los riesgos de las nuevas tecnologías son grandes desconocidos. El mal uso de las redes sociales y de Internet en los ordenadores y en el teléfono móvil, entre otros factores, supone un peligro real para todos los estratos de población, pero en especial para los más jóvenes. Pensemos, ¿realmente somos conscientes de los riesgos que suponen las nuevas tecnologías? ¿Sabemos cómo utilizarlas para no ponernos en riesgo?
Cabe destacar que las denominadas nuevas tecnologías de la información y de la comunicación (TICs) son un distintivo de la época actual y se han convertido en herramientas esenciales en las diferentes áreas de la vida. Esto es, para el área académica, laboral, social, de ocio…
En la mayoría de los ámbitos están presentes las TICS, pues incluyen las diferentes herramientas con las que nos manejamos hoy en día: servicios de contacto electrónico (e-mails, servicios de mensajería instantánea, chats), los teléfonos móviles, tablets y ordenadores, las plataformas online de difusión de contenidos, las redes sociales, entre otros..
Explanation:
Given an integer n and an array a of length n, your task is to apply the following mutation to a:
Array a mutates into a new array b of length n.
For each i from 0 to n - 1, b[i] = a[i - 1] + a[i] + a[i + 1].
If some element in the sum a[i - 1] + a[i] + a[i + 1] does not exist, it should be set to 0. For example, b[0] should be equal to 0 + a[0] + a[1].
Example
For n = 5 and a = [4, 0, 1, -2, 3], the output should be mutateTheArray(n, a) = [4, 5, -1, 2, 1].
b[0] = 0 + a[0] + a[1] = 0 + 4 + 0 = 4
b[1] = a[0] + a[1] + a[2] = 4 + 0 + 1 = 5
b[2] = a[1] + a[2] + a[3] = 0 + 1 + (-2) = -1
b[3] = a[2] + a[3] + a[4] = 1 + (-2) + 3 = 2
b[4] = a[3] + a[4] + 0 = (-2) + 3 + 0 = 1
So, the resulting array after the mutation will be [4, 5, -1, 2, 1].
Input/Output
[execution time limit] 3 seconds (java)
[input] integer n
An integer representing the length of the given array.
Guaranteed constraints:
1 ≤ n ≤ 103.
[input] array.integer a
An array of integers that needs to be mutated.
Guaranteed constraints:
a.length = n,
-103 ≤ a[i] ≤ 103.
[output] array.integer
The resulting array after the mutation.
Answer:
The program written in Java is as follows
import java.util.Scanner;
public class mutilate {
public static void main(String [] args) {
Scanner input = new Scanner(System.in);
int n;
System.out.print("Array Length: ");
n = input.nextInt();
while(n<1 || n > 103) {
System.out.print("Array Length: ");
n = input.nextInt();
}
int a []= new int [n];
int b []= new int [n];
System.out.print("Enter Elements of the Array: ");
for(int i =0;i<n;i++) {
a[i] = input.nextInt();
}
System.out.print("Output: ");
for(int i =0;i<n;i++) {
if(i == 0) {
b[i] = 0+a[i]+a[i+1];
}
else if(i == n-1) {
b[i] = a[i - 1]+a[i]+0;
}
else {
b[i] = a[i - 1]+a[i]+a[i+1];
}
System.out.print(b[i]+" ");
}
}
}
Explanation:
This line allows the program accepts user input
Scanner input = new Scanner(System.in);
This line declares integer n
int n;
The next two line prompts user for length of the array and also accepts input
System.out.print("Array Length: ");
n = input.nextInt();
The following while iteration ensures that the user input is between 1 and 103
while(n<1 || n > 103) {
System.out.print("Array Length: ");
n = input.nextInt();
}
The next two lines declares array a and b
int a []= new int [n];
int b []= new int [n];
The next for iteration allows user enter values for array a
System.out.print("Enter Elements of the Array: ");
for(int i =0;i<n;i++) {
a[i] = input.nextInt();
}
The next for iteration calculates and prints the values for array b based on the instruction in the question
System.out.print("Output: ");
for(int i =0;i<n;i++) {
if(i == 0) {
b[i] = 0+a[i]+a[i+1];
}
else if(i == n-1) {
b[i] = a[i - 1]+a[i]+0;
}
else {
b[i] = a[i - 1]+a[i]+a[i+1];
}
System.out.print(b[i]+" ");
}
Why MUST you request your DSO signed I-20 ship as soon as it is ready and who is responsible to request the I-20
Why MUST you request your DSO signed I-20 ship as soon as it is ready and who is responsible to request the I-20?
a. It is required you have an endorsed/signed I-20 when Customs and Border Patrol or police ask for it
b. We only keep an unsigned digital copy and cannot sign an I-20 after the fact
c. It is against U.S. regulations to send digital (signed or not) DS-2019s and must treat I-20s the same
d. You will need all signed original I-20s to make copies to apply for OPT, STEM and H-1B in the future, so get them now!
e. It is the student’s choice to request each term, however, we cannot go back retroactively to provide past copies
f. We can only provide a signed copy of current I-20 and if changes occur from previous semesters that information will not show
g. The original endorsed I-20 signed by a DSO will be destroyed after 30 days of issuance if not picked up, and it cannot be replicated
h. The cost to have I-20 shipped may go up at any time
i. All the above
Answer:
i. All the above
Explanation:
DSO means designated school officials and they have to do with Student and Exchange Visitor Program (SEVP)-certified schools where students have to get a Form I-20, “Certificate of Eligibility for Nonimmigrant Student Status which provides information about the student's F or M status.
What a student must request for from his DSO signed I-20 ship are all the above options.
Implement the generator function scale(s, k), which yields elements of the given iterable s, scaled by k. As an extra challenge, try writing this function using a yield from statement!
def scale(s, k):
"""Yield elements of the iterable s scaled by a number k.
>>> s = scale([1, 5, 2], 5)
>>> type(s)
>>> list(s)
[5, 25, 10]
>>> m = scale(naturals(), 2)
>>> [next(m) for _ in range(5)]
[2, 4, 6, 8, 10]
"""
Answer:
The generator function using yield from:
def scale(s, k):
yield from map(lambda x: x * k, s)
Another way to implement generator function that works same as above using only yield:
def scale(s, k):
for i in s:
yield i * k
Explanation:
The complete program is:
def scale(s, k):
"""Yield elements of the iterable s scaled by a number k.
>>> s = scale([1, 5, 2], 5)
>>> type(s)
<class 'generator'>
>>> list(s)
[5, 25, 10]
>>> m = scale(naturals(), 2)
>>> [next(m) for _ in range(5)]
[2, 4, 6, 8, 10]
"""
yield from map(lambda x: x * k, s)
If you want to see the working of the above generator function scale() as per mentioned in the above comments, use the following statements :
s = scale([1, 5, 2], 5)
print(type(s))
#The above print statement outputs:
#<class 'generator'>
print(list(s))
#The above print statement outputs a list s with following items:
#[5, 25, 10]
The function def scale(s, k): is
def scale(s, k):
yield from map(lambda x: x * k, s)
This function takes two parameters i.e. s and k and this function yields elements of the given iterable s, scaled by k.
In this statement: yield from map(lambda x: x * k, s)
yield from is used which allows to refactor a generator in a simple way by splitting up generator into multiple generators.
The yield from is used inside the body of a generator function.
The lambda function is a function that has any number of arguments but can only have one expression. This expression is evaluated to an iterable from which an iterator will be extracted. This iterator yields and receives values to or from the caller of the generator. Here the expression is x: x * k and iterable is s. This expression multiplies each item to k.
map() method applies the defined function for each time in an iterable.
The generator function can also be defined as:
def scale(s, k):
for i in s:
yield i * k
For the above example
s = scale([1, 5, 2], 5)
def scale(s,k): works as follows:
s = [1, 5, 2]
k = 5
for loop iterates for each item i in iterable s and yields i*k
i*k multiplies each element i.e 1,5 and 2 to k=5 and returns a list
At first iteration, for example, i*k = 1 * 5 = 5, next iteration i*k = 5*5 = 25 and last iteration i*k = 2*5 = 10. So the output. So
s = scale([1, 5, 2], 5) In this statement now s contains 5, 25 and 10
print(list(s)) prints the values of s in a list as: [5, 25, 10] So output is:
[5, 25, 10]
A member of the human resources department received the following email message after sending an email containing benefit and tax information to a candidate: Your message has been quarantined for the following policy violation external potential PII.Pls contact the IT security admin for further details. Which of the following BEST describes why this message was received?a. The DLP system flagged the message. b. The mail gateway prevented the message from being sent to personal email addresses c. The company firewall blocked the recipient's IP address. d. The file integrity check failed for the attached files.
Answer:
a. The DLP system flagged the message.
Explanation:
Data Leaked Prevention System is the software that detects potential data breaches that may result in the future. It detects the possible data breach, then monitors it and immediately blocks any sensitive data. DLP system is widely used by businesses. The human resource team received a message because sensitive information about the business benefits and tax is shared with a candidate.
Assume the existence of a Phone class. Define a derived class, CameraPhone that contains two data members: an integer named, imageSize, representing the size in megabytes of each picture, and an integer named memorySize, representing the number of megabytes in the camera's memory. There is a constructor that accepts two integer parameters corresponding to the above two data members and which are used to initialize the respective data members. There is also a function named numPictures that returns (as an integer) the number of pictures the camera's memory can hold.
#include <iostream>
using namespace std;
class CameraPhone:Phone{
int imageSize,memorySize;
public:
CameraPhone(int image_size,int memory_size):imageSize(image_size),memorySize(memory_size){}
int numPictures(){
return memorySize-imageSize;
}
}
int main(){}
Here is the code for the derived class, CameraPhone:
class Phone:
def __init__(self, brand, model, price): self.brand = brand self.model = model self.price = priceclass CameraPhone(Phone):
def __init__(self, brand, model, price, imageSize, memorySize): super().__init__(brand, model, price) self.imageSize = imageSize self.memorySize = memorySizedef numPictures(self):
return self.memorySize // self.imageSizeWhat are the derived class?This code defines a derived class, CameraPhone, that inherits from the Phone class. The CameraPhone class has two additional data members: imageSize and memorySize. The constructor for the CameraPhone class takes two additional parameters corresponding to these data members. The numPictures() function returns the number of pictures that the camera's memory can hold.
Here is an example of how to use the CameraPhone class:
phone = CameraPhone("Apple", "iPhone 13 Pro", 1000, 10, 100)
print(phone.numPictures())
# Output: 10
This code will print the number of pictures that the camera's memory can hold, which is 10 in this case.
Find out more on derived class here: https://brainly.com/question/31942927
#SPJ2
Briefly describe the importance of thoroughly testing a macro before deployment. What precautions might you take to ensure consistency across platforms for end users?
Answer:
Answered below
Explanation:
A macro or macroinstruction is a programmable pattern which translates a sequence of inputs into output. It is a rule that specifies how a certain input sequence is mapped to a replacement output sequence. Macros makes tasks less repetitive by representing complicated keystrokes, mouse clicks and commands.
By thoroughly testing a macro before deployment, you are able to observe the flow of the macro and also see the result of each action that occurs. This helps to isolate any action that causes an error or produces unwanted results and enable it to be consistent across end user platforms.
When a user runs a program in a text-based environment, such as the command line, what determines the order in which things happen?
Explanation:
In general, when a program runs in text-based environment like command line interface, the program is used for determining the order in which things happen.
As the program runs, the user will not have any choice and he or she can enter the required data.
If the user enters the data in required format then, he/she can get the result or output in desired format.