Answer:
Explanation:
The following code is written in Javascript and is a function called primes that takes in a single parameter as an int variable named n. An array is created and looped through checking which one is prime. If So it, changes the value to true, otherwise it changes it to false. Then it creates another array that loops through the boolArray and grabs the actual numberical value of all the prime numbers. A test case for n=150 is created and the output can be seen in the image below highlighted in red.
function primes(n) {
//Boolean Array to check which numbers from 1 to n are prime
const boolArr = new Array(n + 1);
boolArr.fill(true);
boolArr[0] = boolArr[1] = false;
for (let i = 2; i <= Math.sqrt(n); i++) {
for (let j = 2; i * j <= n; j++) {
boolArr[i * j] = false;
}
}
//New Array for Only the Prime Numbers
const primeNums = new Array();
for (let x = 0; x <= boolArr.length; x++) {
if (boolArr[x] === true) {
primeNums.push(x);
}
}
return primeNums;
}
alert(primes(150));
You are going to purchase (2) items from an online store.
If you spend $100 or more, you will get a 10% discount on your total purchase.
If you spend between $50 and $100, you will get a 5% discount on your total purchase.
If you spend less than $50, you will get no discount.
Givens:
Cost of First Item (in $)
Cost of Second Item (in $)
Result To Print Out:
"Your total purchase is $X." or "Your total purchase is $X, which includes your X% discount."
Answer:
Code:-
using System;
using System.Collections.Generic;
class MainClass {
public static void Main (string[] args) {
int Val1,Val2,total;
string input;
double overall;
Console.Write("Cost of First Item (in $)");
input = Console.ReadLine();
Val1 = Convert.ToInt32(input);
Console.Write("Cost of Second Item (in $)");
input = Console.ReadLine();
Val2 = Convert.ToInt32(input);
total=Val1+Val2;
if (total >= 100)
{
overall=.9*total;
Console.WriteLine("Your total purchase is $"+overall);
}
else if (total >= 50 & total < 100)
{
overall=.95*total;
Console.WriteLine("Your total purchase is $"+overall);
}
else
{
Console.WriteLine("Your total purchase is $"+total);
}
}
}
Output:
3. Using Assume the following list of keys: 36, 55, 89, 95, 65, 75, 13, 62, 86, 9, 23, 74, 2, 100, 98 This list is to be sorted using the quick sort algorithm as discussed in this chapter. Use pivot as the middle element of the list. a. Give the resulting list after one call to the function partition. b. What is the size of the list that the function partition partitioned
Answer:
a. 36, 55, 13, 9, 23, 2, 62, 86, 95, 65,74, 75, 100, 98, 89
b. 15
Explanation:
tinh S(n) = 1+2+3+.....+n
Answer:
-1/12
Explanation:
[tex]\sum_{k=0}^{k=n} k = \frac{n(n+1)}{2}\\[/tex]
look up the derivation by Srinivasa Ramanujan for a formal proof.
Select the correct answer.
What testing approach does a development team use when testing the developed code rather than just the functionality of the code?
A.
white box testing
B.
black box testing
C.
acceptance testing
D.
usability testing
Answer:
D. usability testing
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis and requirements.
3. Software design and prototyping.
4. Development (coding).
5. Integration and testing
6. Deployment.
7. Operations and maintenance.
Usability testing is a testing technique used by a software development team to test a developed code rather than just the functionality of the code.
The main purpose of usability (user experience) testing is to determine how easy, user-friendly or difficult it is for end users (real people) to use a software application or program.
The Janitorial and Cafeteria departments are support departments. Samoa uses the sequential method to allocate support department costs, first allocating the costs from the Janitorial Department to the Cafeteria, Cutting, and Assembly departments. Determine the proportional (percentage) usage of the Janitorial Department by the:
Complete Question:
Departmental information for the four departments at Samoa Industries is provided below. Total Cost Cost Driver Square Feet Number of employees Janitorial $150,000 square footage serviced 200 Cafeteria 50,000 Number of employees 20,000 Cutting 1,125,000 4,000 120 Assembly 1,100,000 16,000 The Janitorial and Cafeteria departments are support departments Samoa uses the sequential method to allocate support department costs, first allocating the costs Department to the Cafeteria, Cutting and Assembly departments Determine the proportional (percentage) usage of the Janitorial Department by the a. Cafeteria Department b. Cutting Department c. Assembly Department
Answer:
Samoa Industries
Proportional (percentage) usage of the Janitorial Department:
Cafeteria = 50%
Cutting = 10%
Assembly = 40%
Explanation:
a) Data and Calculations:
Total Cost Cost Driver Square Feet Number of
employees
Janitorial $150,000 Square footage serviced 200 40
Cafeteria 50,000 Number of employees 20,000 12
Cutting 1,125,000 4,000 120
Assembly 1,100,000 16,000 40
Proportional (percentage) usage of the Janitorial Department:
Cafeteria = 50% (20,000/40,000 * 100)
Cutting = 10% (4,000/40,000 * 100)
Assembly = 40% (16,000/40,000 * 100)
Cost Allocation of the Janitorial Department:
Cafeteria = 50% * $150,000 = $75,000
Cutting = 10% * $150,000 = 15,000
Assembly = 40,% * $150,000 = 60,000
Total = $150,000
The Marietta Country Club has asked you to write a program to gather, then display the results of the golf tournament played at the end of March. The Club president Mr. Martin has asked you to write two programs.
The first program will input each player's first name, last name, handicap and golf score and then save these records in a file named golf.txt (each record will have a field for the first name, last name, handicap and golf score).
The second program will read the records from the golf.txt file and display them with appropriate headings above the data being displayed.
If the score is = Par, then display 'Made Par'
If the score is < Par, then display 'Under Par'
If the score is > Par, then display 'Over Par'
There are 16 players in the tournament. Par for the course is 80. The data is as follows:
Andrew Marks 11.2 72
Betty Franks 12.8 89
Connie William 14.6 92
Donny Ventura 9.9 78
Ernie Turner 10.1 81
Fred Smythe 8.1 75
Greg Tucker 7.2 72
Henry Zebulon 8.3 83
Ian Fleming 4.2 72
Jan Holden 7.7 84
Kit Possum 7.9 79
Landy Bern 10.3 93
Mona Docker 11.3 98
Kevin Niles 7.1 80
Pam Stiles 10.9 87
Russ Hunt 5.6 73
Answer:
Explanation:
The following program is written in Python. It creates two functions, one for writting the players and their scores to the file, and another function for reading the file and outputting whether or not they made Par. The functions can be called as many times that you want and the writeFile function allows for 16 inputs to be made when called. A test case has been provided with all of the players mentioned in the question. The output can be seen in the attached image below.
def writeFile():
file = open('output.txt', 'w')
for x in range(16):
firstName = input("Enter First Name:")
lastName = input("Enter Last Name:")
handicap = input("Handicap:")
score = input("Score:")
file.write(str(firstName) + " " + str(lastName) + " " + str(handicap) + " " + str(score) + "\n")
file.close()
def readFile():
file = open('output.txt', 'r')
for line in file:
lineArray = line.split(" ")
if int(lineArray[-1]) < 80:
print(str(lineArray[0]) + " " + str(lineArray[1]) + " Under Par" )
elif int(lineArray[-1]) == 80:
print(str(lineArray[0]) + " " + str(lineArray[1]) + " Made Par")
else:
print(str(lineArray[0]) + " " + str(lineArray[1]) + " Over Par")
file.close()
writeFile()
readFile()
Suppose you have some List of S List of Strings called List and a String prefix. Write a method that removes all the Strings from list that begin with prefix. public void removePrefixStrings(List-String- list, String prefix) 7. What is the time complexity of this algorithm?
Answer:
public void removePrefixStrings(List<String> list , String prefix) {
if(list==null || list.size()==0)
return;
for(int i=0; i<list.size();) {
if(list.get(i).startsWith(prefix))
list.remove(i);
else
++i;
}
}
Time Complexity: If the prefix is the same as String length, Then finding all prefix match will take n *n = n2
Then removal is also n
So the total time complexity is O(n3)
How do i connect WiFi on windows xp without icon?
Answer:
Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.
What do you do if your computer dies/malfunctions? Reboot (Restart) Shut Down Recovery CD and Recover your system Call a person to fix it
Answer:
Restart
Explanation:
Simply I may restart my pc if it dies/malfunctions. I'll not restart immediately, I'll wait for an hour and do restart my computer. If it doesn't work then maybe I'll Call a person to fix it.
ITING THE ANSWER
1. According to Turner and Wilson (2018), Information Literacy consists of
tasks EXCEPT...
A applying previous knowledge.
C. finding appropriate information
B. determining information need.
2. Outlining your problem, developing research questions, selecting keywords a
developing concept charts are activities during...
D. using information ethically
A. communicating information.
B. determining information need.
C. evaluating search results.
D. finding appropriate resources,
3. Asking questions such as what, why, where and how is an effective way to
A. craft your research questions.
B. develop good keywords
C. find good information
D. understand your topic,
4. In asking "what" questions, you intend to find...
A. answers and solutions.
Answer:
Answer my first question
Code Example 17-1 class PayCalculator { private: int wages; public: PayCalculator& calculate_wages(double hours, double wages) { this->wages = hours * wages; return *this; } double get_wages() { return wages; } }; (Refer to Code Example 17-1.) What coding technique is illustrated by the following code? PayCalculator calc; double pay = calc.calculate_wages(40, 20.5).get_wages(); a. self-referencing b. function chaining c. dereferencing d. class chaining
Answer:
The answer is "Option b".
Explanation:
Function chaining is shown by this code, as the functions are called one after the other with one statement. Whenever you want to call a series of methods through an object, that technique is beneficial. Just because of that, you may give the same effect with less code and have a single given value only at top of the leash of operations.
What are some 5 constraints in using multimedia in teaching
Answer:
Explanation:
Technological resources, both hardware and software
Technological skills, for both the students and teacher
Time required to plan, design, develop, and evaluate multimedia activities
Production of multimedia is more expensive than others because it is made up of more than one medium.
Production of multimedia requires an electronic device, which may be relatively expensive.
Multimedia requires electricity to run, which adds to the cost of its use
There are constraints in using multimedia in teaching; The Technological resources, both hardware and software Also, Technological skills, for both the students and teacher
What is a characteristic of multimedia?
A Multimedia system has four characteristics and they are use to deliver the content as well as the functionality.
The Multimedia system should be be computer controlled. The interface is interactive for their presentation and lastly the information should be in digital.
There are constraints in using multimedia in teaching;
The Technological resources, both hardware and software
Also, Technological skills, for both the students and teacher
Since Time required to plan, design, develop, and evaluate multimedia activities
The Production of multimedia is more expensive than others because it is made up of more than one medium.
The Production of multimedia requires an electronic device, which may be relatively expensive.
The Multimedia requires electricity to run, which adds to the cost of its use.
Learn more about multimedia here;
https://brainly.com/question/9774236
#SPJ2
How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will grow by a constant 2 spaces each time a new item is added to an already full dynamic array
Answer:
Explanation:
260 cost units, Big O(n) complexity for a push
describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.
Answer:
Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.
Consider a system with seven processes: E, F, G, H, I, J, K and six resources: U, V, W, X, Y, Z. Process E holds U and wants V. Process F holds nothing but wants W. Process G holds nothing but wants V. Process H holds X and wants V and W. Process I holds W and wants Y. Process J holds Z and wants V. Process K holds Y and wants X. Is this system deadlocked?
a. Yes
b. No
Answer:
a. Yes
Explanation:
System is deadlock due to process HIK. Process H holds X and wants V and W. Process I holds W and wants Y. Process K holds Y and wants X. The system will become deadlock due to these three different processes.
What are some of the advantages and disadvantages of connection-oriented WAN/Man as opposed to connection-less?
Answer and Explanation:
Connection oriented WAN/MAN as opposed to connection less network is a type of wide area network that requires communicating entities in the network to establish a dedicated connection for their communication before they start communicating. This type of network will use these established network layers only till they release it, typical of telephone networks.
Advantages include:
Connection is reliable and long.
Eliminates duplicate data issues.
Disadvantages include:
Resource allocation while establishing dedicated connection slows down speed and may not fully utilize network resources.
There are no plan B's for network congestion issues, albeit occurring rarely with this type of network.
If every company is now a technology company, then what does this mean for every student attending a business college
Answer:
Explanation:
There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.
But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.
2. Which property is used for hiding text of the textbox?
a) Password Char b) Text Char c) Char Password d) Pass Char
Answer:
password char
Explanation:
The password char property allows the text being written in the textbox to be hidden in the form of dots or stars. As such the user entering the password is secure, as no one nearby can know the password by watching the texts.
Question: Name the person who originally introduced the idea of patterns as a solution design concept.
Answer:
architect Christopher Alexander is the person who originally introduced the idea of patterns as a solution design concept.
The person who originally introduced the idea of patterns as a solution design concept named as Christopher Alexander who was an architect.
What is architecture?Architecture is referred to as an innovative technique or artwork based on buildings or physical structures that aims at creating cultural values for upcoming generations to understand the importance of history.
The external layout can be made to best support human existence and health by using a collection of hereditary solutions known as the "pattern language." It creates a set of helpful relationships by combining geometry and social behavior patterns.
Christopher Alexander, a British-American engineer and design theorist of Austrian heritage, is renowned for his several works on the design and construction process introduced the idea of patterns as a solution design concept.
Learn more about pattern language architecture, here:
https://brainly.com/question/4114326
#SPJ6
How to use the AI System ?
ANSWER:
· New artificial intelligence systems are being developed to help teachers administer more effective testing that could uncover some of these often-hidden conditions. Once they can be properly identified, educators can tap into the resources available for a learning disability. Students can use AI to give reliable feedback.
Write a program that randomly chooses among three different colors for displaying text on the screen. Use a loop to display 20 lines of text, each with a randomly chosen color. The probabilities for each color are to be as follows: white 30%, blue 10%, green 60%. Suggestion: Generate a random integer between 0 and 9. If the resulting integer falls in the range 0 to 2 (inclusive), choose white. If the integer equals to 3, choose blue. If the integer falls in the range 4 to 9 (inclusive), choose green. Test your program by running it ten times, each time observing whether the distribution of line colors appears to match the required probabilities.
INCLUDE Irvine32.inc
.data
msgIntro byte "This is Your Name's fourth assembly extra credit program. Will randomly",0dh,0ah
byte "choose between three different colors for displaying twenty lines of text,",0dh,0ah
byte "each with a randomly chosen color. The color probabilities are as follows:",0dh,0ah
byte "White=30%,Blue=10%,Green=60%.",0dh,0ah,0
msgOutput byte "Text printed with one of 3 randomly chosen colors",0
.code
main PROC
;
//Intro Message
mov edx,OFFSET msgIntro ;intro message into edx
call WriteString ;display msgIntro
call Crlf ;endl
call WaitMsg ;pause message
call Clrscr ;clear screen
call Randomize ;seed the random number generator
mov edx, OFFSET msgOutput;line of text
mov ecx, 20 ;counter (lines of text)
L1:;//(Loop - Display Text 20 Times)
call setRanColor ;calls random color procedure
call SetTextColor ;calls the SetTextColor from library
call WriteString ;display line of text
call Crlf ;endl
loop L1
exit
main ENDP
;--
setRanColor PROC
;
; Selects a color with the following probabilities:
; White = 30%, Blue = 10%, Green = 60%.
; Receives: nothing
; Returns: EAX = color chosen
;--
mov eax, 10 ;range of random numbers (0-9)
call RandomRange ;EAX = Random Number
.IF eax >= 4 ;if number is 4-9 (60%)
mov eax, green ;set text green
.ELSEIF eax == 3 ;if number is 3 (10%)
mov eax, blue ;set text blue
.ELSE ;number is 0-2 (30%)
mov eax, white ;set text white
.ENDIF ;end statement
ret
setRanColor ENDP
IN C++
A. Create an abstract base class called Currency with two integer attributes, both of which are non-public. The int attributes will represent whole part (or currency note value) and fractional part (or currency coin value) such that 100 fractional parts equals 1 whole part.
B. Create one derived class - Money - with two additional non-public string attributes which will contain the name of the currency note (Dollar) and currency coin (Cent) respectively. DO NOT add these attributes to the base Currency class.
C. In your base Currency class, add public class (C++ students are allowed to use friend methods as long as a corresponding class method is defined as well) methods for the following, where appropriate:
Default Construction (i.e. no parameters passed)
Construction based on parameters for all attributes - create logical objects only, i.e. no negative value objects allowed
Copy Constructor and/or Assignment, as applicable to your programming language of choice
Destructor, as applicable to your programming language of choice
Setters and Getters for all attributes
Adding two objects of the same currency
Subtracting one object from another object of the same currency - the result should be logical, i.e. negative results are not allowed
Comparing two objects of the same currency for equality/inequality
Comparing two objects of the same currency to identify which object is larger or smaller
Print method to print details of a currency object
All of the above should be instance methods and not static.
The add and subtract as specified should manipulate the object on which they are invoked. It is allowed to have overloaded methods that create ane return new objects.
D. In your derived Money class, add new methods or override inherited methods as necessary, taking care that code should not be duplicated or duplication minimized. Think modular and reusable code.
E. Remember -
Do not define methods that take any decimal values as input in either the base or derived classes.
Only the print method(s) in the classes should print anything to console.
Throw String (or equivalent) exceptions from within the classes to ensure that invalid objects cannot be created.
F. In your main:
Declare a primitive array of 5 Currency references (for C++ programmers, array of 5 Currency pointers).
Ask the user for 5 decimal numbers to be input - for each of the inputs you will create one Money object to be stored in the array.
Once the array is filled, perform the following five operations:
Print the contents of the array of objects created in long form, i.e. if the user entered "2.85" for the first value, it should be printed as "2 Dollar 85 Cent".
Add the first Money object to the second and print the resulting value in long form as above.
Subtract the first Money object from the third and print the resulting value in long form as above.
Compare the first Money object to the fourth and print whether both objects are equal or not using long form for object values.
Compare the first Money object to the fifth and print which object value is greater than the other object value in long form.
All operations in the main should be performed on Currency objects demonstrating polymorphism.
Remember to handle exceptions appropriately.
There is no sample output - you are allowed to provide user interactivity as you see fit.
Answer:
I only do Design and Technology
sorry don't understand.
Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.
Answer:
c
Explanation:
Write a program that asks the user to enter in a username and then examines that username to make sure it complies with the rules above. Here's a sample running of the program - note that you want to keep prompting the user until they supply you with a valid username:
user_in = input ("Please enter your username: " )
if user_in in "0123456789":
print ("Username cannot contain numbers")
elif user_in in "?":
print ("Username cannot continue special character")
else:
print (" Welcome to your ghetto, {0}! ".format(user_in))
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task
Question Completion with Options:
A. device flow correlation
B. simple detections
C. application blocking list
D. advanced custom detections
Answer:
The outbreak control method that is used to accomplish the task of configuring AMP for endpoints and to block certain files from executing is:
C. application blocking list
Explanation:
The application blocking list creates a list of application files, which the AMP continuously tracks and analyzes to compare the file activities with previous cyber attacks. Specifically, the AMP for Endpoints is a cloud-managed endpoint security solution, which provides a retrospective alert to prevent cyber-security threats, and rapidly detects, contains, and remediates malicious files on the endpoints.
continuously tracks and analyzes files and file activities across your systems, and compares these events to what preceded or happened in past attacks. If a file exhibits malicious behavior, the AMP provides you with a retrospective alert which enables you to stop a potential threat from succeeding.
Which support function under Tech Mahindra is governing data privacy and protection related requirements
Answer:
Privacy Policy
Explanation:
PRIVACY POLICY is the support function under Tech Mahindra that is governing data privacy and protection-related requirements.
Given that support functions are functions which assist and in a way contribute to the company goal.
Other support functions are human resources, training and development, salaries, IT, auditing, marketing, legal, accounting/credit control, and communications.
The above statement is based on the fact that the Privacy Policy clarifies all the data protection rights, such as the right to object to some of the production processes that TechM may carry out.
Neymar machine that Run on electricity
"Neymar" = "name a"?
if so, well, there are many, like the little glowing box you use the type questions to the brainliest community, let it be a phone, a pc, or a molded Nintendo
if you meant Neymar indeed, I'm not sure if he runs on electricity, unless he is a soccer playing android somehow.
e) Point out the errors( if any) and correct them:-
class simple
{
inta,b,c;
double sumNumber
{
int d = a + b + c;
double e = d/5.6;
return e;
}
void show Number()
{
a = 10, b = 20, c=5;
System.out.println(d);
double f = sumNumber(a,b,c);
System.out.print(e);
}
}
Explanation:
double e-d/5.6;is wrong it should return to c
Select the correct statement(s) regarding PONS. a. only MMF cables can be used, since MMF enables greater data capacities compared to SMF b. PONS systems require active amplifiers, since high frequency signals attenuate quickly over distance c. PONS systems use passive devices between OLT and ONT d. all are correct statements
Answer:
The correct statement regarding PONS is:
c. PONS systems use passive devices between OLT and ONT
Explanation:
PON means Passive Optical Network. Based on fiber-optic telecommunications technology, PON is used to deliver broadband network access to individual end-customers. It enables a single fiber from a service provider to maintain an efficient broadband connection for multiple end-users (homes and small businesses). OLT means Optical Line Terminal, while ONT means Optical Network Terminal. They provide access to the PON.
cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]
Answer:
please translate
Thank you✌️