Answer:
Service-Level Agreement (SLA).
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Platform as a Service (PaaS).
2. Software as a Service (SaaS).
3. Infrastructure as a Service (IaaS).
The details of various measurable characteristics related to information technology (IT) outcomes of a cloud environment or service, are typically expressed in a Service-Level Agreement (SLA).
Generally, a service level agreement (SLA) is usually between a service provider and its customers (end users).
In order to define and provide satisfactory service, organizations that provide services are expected to implement a service level agreement and it should comprise of the following parameters; responsibilities, expectations, metrics, time and frequency.
Please draw the dynamic array stack structure (you must mention the size and capacity at each step) after the following lines of code are executed. You should assume that the initial capacity is 2 and a resize doubles the capacity.
values = Stack()
for i in range( 16 ) :
if i % 3 == 0 :
values.push( i )
else if i % 4 == 0 :
values.pop()
Answer:
Explanation:
dxfcgvhb
Qla
What are the activities a Database Designer will do if using the SDLC to design a Database [10]
Q1b
List the five main components of Access Database and state their uses [10]
Answer:a
What are the activities a Database Designer will do if using the SDLC to design a Database [10]
Q1b
List the five main components of Access Database and state their uses [1
Explanation:
Which of these is a tool for creating mobile apps?
Appy Pie
C#
Apple Pie
C++
Answer:
C++
Explanation:
C++ is used in application development
with the aid of examples explain the differences between open source software and licensed software
Answer:
Explanation:
Source is when a company go no limits to run the software but can easily be taken done by a complaint or two or a bug while a licensed it a protected version of the software.
cloud offers better protection compare to on premise?
Why is cloud better than on-premise? Dubbed better than on-premise due to its flexibility, reliability and security, cloud removes the hassle of maintaining and updating systems, allowing you to invest your time, money and resources into fulfilling your core business strategies.
The security of the cloud vs. on-premises is a key consideration in this debate. Cloud security controls have historically been considered less robust than onprem ones, but cloud computing is no longer a new technology. . A company running its own on-premises servers retains more complete control over security.
Believe it!!
Pls follow me.
hi, solution, help me please.
Answer:
5hujjibjjjjjnNkzkskskwjejekekdkdkeeioee9
Answer:
is it infinity ? let me know
An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two of the websites share the domain name but have different subdomain prefixes.
Which of the following SSL certificates should the administrator purchase to protect all the websites and be able to administer them easily at a later time?
A . One SAN certificate
B . One Unified Communications Certificate and one wildcard certificate
C . One wildcard certificate and two standard certificates
D . Five standard certificates
Answer:
Option A (One SAN certificate) is the right answer.
Explanation:
A vulnerability management certificate that permits many domain identities to be safeguarded by such a singular or unique certification, is considered a SAN certificate.Though on the verge of replacing common as well as accepted security credentials with either of these de-facto certifications.Other alternatives are not connected to the given scenario. Thus the above option is correct.
3. Using Assume the following list of keys: 36, 55, 89, 95, 65, 75, 13, 62, 86, 9, 23, 74, 2, 100, 98 This list is to be sorted using the quick sort algorithm as discussed in this chapter. Use pivot as the middle element of the list. a. Give the resulting list after one call to the function partition. b. What is the size of the list that the function partition partitioned
Answer:
a. 36, 55, 13, 9, 23, 2, 62, 86, 95, 65,74, 75, 100, 98, 89
b. 15
Explanation:
During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender to re-transmit the frame and hence it will increase the re-transmission overhead. By considering the scenarios given below, you have to choose whether the packets should be encapsulated in a single frame or multiple frames in order to minimize the re-transmission overhead.
Justify your answer with one valid reason for both the scenarios given below.
Scenario A: Suppose you are using a network which is very prone to errors.
Scenario B: Suppose you are using a network with high reliability and accuracy.
The packets would be encapsulated in single frame in scenario A. In scenario B, it should be in multi frames.
In scenario A, given that this network has been said to be prone to error, the packets should be encapsulated in single frames.
The reason for this is because, using a single frame helps to decrease error. We have been told already that it is prone to error. If you use the multi frame, there would be very high likelihood of errors occurring.
In scenario B, given that the network is accurate and very reliable, the best packet is the multi frame.
It would give a quicker transmission and the likelihood of errors occurring is also low.
Read more on https://brainly.com/question/24373056?referrer=searchResults
If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to a group? What commands would you use? What configuration files would you check and modify?
Following are the responses to this question:
The user account is "olivia".In the Linux system to see the account go to the "/home directory".For the configuration file we use ".bash_logout , .bash_profile, and .bashrc" files.Creating users:
We will use the useradd command to achieve this. Using that same command, you can create users who would log in or customers who would log in (in the case of creating a user for a software installation).
In its basic form, the command is as follows:
[Options] useradd usernameTake this user olivia, for instance. Assuming that you had been to issue the command prompt:
olivia has become a user.Users are added to the system without the need for a home directory and are unable to log on. It if we were using this rather than running the command without arguments?
sudo using useradd -m oliviaUsing the command above, a new user would be created, including a home directory that corresponded to the username. That means that you might now see the name "olivia" in the directory "/home".
But what about the lockout concern that was raised earlier? Both these methods are possible. After creating the user, you can enter the following command:
Password for olivia is: sudo passwd oliviaYou'll be requested to enter & verify your new password once you've completed the process. This unlocks the user profile, allowing them to log in.
This command might look like if you wanted to accomplish it in one go:
sudo useradd -m olivia -p PASSWORDYou should be using Passcodes as the login for the user olivia.
As soon as the user logs in, he or she can update their account password by using the password command to input their current password, and afterward entering/verifying their new one.
To create a user that has no personal account and cannot log in, execute the following instructions:
sudo use useradd as the-M USERNAME sudo use usermod as the -L USERNAMEThe user to be added is identified by USERNAME.
It establishes a user with really no root folder and prevents them from signing in with a second operation.
To add an existing user to a group on Linux, follow the instructions:
As root, log in to your accountUse the useradd instruction to add a new user (for example, useradd roman)If you'd like to log on as a new customer, type su plus that user's name.Entering the word "exit" will logout you from your account.Another way to add a user to a group under Linux would be to use the following syntax:
Alternatively, you can use the usermod command.The name of the club should be substituted for example group in this sentence.Example username should be replaced with the name of the user you'd like added.The following operations are performed when a new login is added to the system.
The user's home directory (/home/username by default) is now created.To set configuration files for the user's session, the following secret files are copied into another user's home directory..bash_logout
.bash_profile
.bashrc
/var/spool/mail/username includes the user's mail spool.The new user account is arranged in groups with the same name.Learn more:
Linux system: brainly.com/question/13843535
tinh S(n) = 1+2+3+.....+n
Answer:
-1/12
Explanation:
[tex]\sum_{k=0}^{k=n} k = \frac{n(n+1)}{2}\\[/tex]
look up the derivation by Srinivasa Ramanujan for a formal proof.
You are consulting with another medium sized business regarding a new database they want to create. They currently have multiple normalized source databases that need consolidation for reporting and analytics. What type of database would you recommend and why
Answer:
The enormous amount of data and information that a company generates and consumes today can become an organizational and logistical nightmare. Storing data, integrating it and protecting it, so that it can be accessed in a fluid, fast and remote way, is one of the fundamental pillars for the successful management of any company, both for productive reasons and for being able to manage and give an effective response to the customers.
Good big data management is key to compete in a globalized market. With employees, suppliers and customers physically spread across different cities and countries, the better the data is handled in an organization, the greater its ability to react to market demand and its competitors.
Databases are nowadays an indispensable pillar to manage all the information handled by an organization that wants to be competitive. However, at a certain point of development in a company, when growth is sustained and the objective is expansion, the doubt faced by many managers and system administrators is whether they should continue to use a database system, or if they should consider the leap to a data warehouse. When is the right time to move from one data storage system to another?
Write a program that reads a list of 10 integers, and outputs those integers in reverse. For coding simplicity, follow each output integer by a space, including the last one. Then, output a newline. coral
def reverse_list (num_list):
try:
if num_list.isdigit() == True:
return num_list[::-1]
elif num_list < 0:
return "Negative numbers aren't allowed!"
except ValueError:
return "Invalid input!"
user_list = list (int (input ("Please enter ten random positive numbers: " )))
print (reverse_list (user_list))
Write a program that repeatedly accepts as input a string of ACGT triples and produces a list of the triples and the corresponding amino acids, one set per line. The program will continue to accept input until the user just presses ENTER without entering any DNA codes.
Answer:
Explanation:
The following code is written in Python. I created a dictionary with all the possible gene combinations and their corresponding amino acids. The user then enters a string. The string is split into triples and checked against the dictionary. If a value exists the gene and amino acid is printed, otherwise an "Invalid Sequence" error is printed for that triple. The program has been tested and the output can be seen in the attached image below.
def printAminoAcids():
data = {
'TTT': 'Phe', 'TCT': 'Ser', 'TGT': 'Cys', 'TAT': 'Tyr',
'TTC': 'Phe', 'TCC': 'Ser', 'TGC': 'Cys', 'TAC': 'Tyr',
'TTG': 'Leu', 'TCG': 'Ser', 'TGG': 'Trp', 'TAG': '***',
'TTA': 'Leu', 'TCA': 'Ser', 'TGA': '***', 'TAA': '***',
'CTT': 'Leu', 'CCT': 'Pro', 'CGT': 'Arg', 'CAT': 'His',
'CTC': 'Leu', 'CCC': 'Pro', 'CGC': 'Arg', 'CAC': 'His',
'CTG': 'Leu', 'CCG': 'Pro', 'CGG': 'Arg', 'CAG': 'Gln',
'CTA': 'Leu', 'CCA': 'Pro', 'CGA': 'Arg', 'CAA': 'Gln',
'GTT': 'Val', 'GCT': 'Ala', 'GGT': 'Gly', 'GAT': 'Asp',
'GTC': 'Val', 'GCC': 'Ala', 'GGC': 'Gly', 'GAC': 'Asp',
'GTG': 'Val', 'GCG': 'Ala', 'GGG': 'Gly', 'GAG': 'Glu',
'GTA': 'Val', 'GCA': 'Ala', 'GGA': 'Gly', 'GAA': 'Glu',
'ATT': 'Ile', 'ACT': 'Thr', 'AGT': 'Ser', 'AAT': 'Asn',
'ATC': 'Ile', 'ACC': 'Thr', 'AGC': 'Ser', 'AAC': 'Asn',
'ATG': 'Met', 'ACG': 'Thr', 'AGG': 'Arg', 'AAG': 'Lys',
'ATA': 'Ile', 'ACA': 'Thr', 'AGA': 'Arg', 'AAA': 'Lys'
}
string = input("Enter Sequence or just click Enter to quit: ")
sequence_list = []
count = 0
gene = ""
for x in range(len(string)):
if count < 3:
gene += string[x]
count += 1
else:
sequence_list.append(gene)
gene = ""
gene += string[x]
count = 1
sequence_list.append(gene)
for gene in sequence_list:
if gene.upper() in data:
print(str(gene.upper()) + ": " + str(data[gene.upper()]))
else:
print(str(gene.upper()) + ": invalid sequence")
printAminoAcids()
c)what formula would be in the cell E2
Excel will generally be able to handle any properly-input mathematical formula, if valid operators are used. Commonly used operators include "+" (addition), "-" (subtraction), "*" (multiplication) and "/" (division). (Microsoft has a complete list of valid operators to be used in Excel formulas on the Office website). Here are some examples of formulas using common operators:
Formula Description
=C2-B2 Subtracts contents of B2 from contents of C2
=C2/B2 Divides contents of C2 by contents of B2
=(B2+C2+D2)/3 Adds contents of B2, C2, and D2 and divides result by 3
After hitting "Enter", the cell will display the calculated value, while the formula bar will still display the formula. (Note: Always hit “Enter” when finished entering a formula, manually. If you click off the cell, the cell you click to will be added to your formula.)Formulas
Formulas in Excel are basically mathematical expressions that use cell references (e.g., “A5”,” D17”) as arguments. For example, a formula that adds the contents of cell E5 and E6 could be written as follows:
= E5+E6
(Note: all formulas in Excel need to be preceded by an “=” sign.) If the values contained in E5 and E6 are 6 and 11, respectively, the formula will produce 17 as the value it displays. If you change E5 to 7, the result will automatically change to 18.
Example
Let's say you were putting together an office supply order, and you wanted to keep track of much you were spending. You could put together a spreadsheet like the one below, with the list of items to be purchased, their unit prices, the number of each item ordered, and the total spent for each. It would make sense to enter the things you know in advance (like the price of individual items and the number ordered), but you could let Excel calculate the totals for you. For the first item listed below (pencils), this could be done by making the value of the total price (cell D2), the value of the unit price (held in cell C2) multiplied by the number of items ordered (held in D2). This formula would be written "=B2*C2".
Once you click "OK", your completed formula will be input into the cell.
Copying and pasting formulas
Often, you will need Excel to do a series of similar computations, where the only things that will change are the cells used as arguments. For instance, in the example above, you would probably like Excel to calculate the Total Price for each item in the order. You could re-input the same formula used to get the total price for pencils in each cell in that row, just changing the cells referenced (i.e. "=PRODUCT(B3:C3)", "=PRODUCT(B4:C4)", etc.), but Excel has simpler method for this. If you have multiple cells in the same row or column that need to do the same computation, you can simply copy the value in the cell you entered a formula, and then paste it into the subsequent cells. Excel will then automatically adjust which cells are included in the formula, based upon which cell the formula was pasted to. So, if the original formula entered in D2 was "=PRODUCT(B2:C2)", the formula pasted into D4 would be "=PRODUCT(B4:C4)"
More simply, if you have a formula you want repeated in a number of directly adjoining cells, you can just click and drag the bottom right corner of the cell with the original formula (see image below) onto the cells you want the same formula entered, and Excel will automatically copy and paste the formula for you, with appropriate adjustments made to the cell numbers in the formula.
After selecting "PRODUCT" and clicking OK, you will get another dialog box, that allows you to select the cells to be multiplied. You can do this for individual cells, by selecting cells separately in the "Number1" and "Number2" boxes shown below, or by selecting an array of cells, by clicking and dragging on the range cells you want to use on the spreadsheet, itself. (Note: if you try to enter a formula in a cell using the Insert Formula button and there are adjacent cells with numbers, Excel will often select those cells automatically, so make sure the cells selected in the dialog box are the correct ones.) Excel also has built-in functions that can do a lot of useful calculations. These are most easily accessed by hitting the Insert Function button, which is represented by the “fx” symbol next to the formula bar. For example, instead of entering the formula shown above, the same result could have been achieved using the built-in "PRODUCT" function by clicking in cell D2 and hitting the Insert Formula button. This would give a dialog box like the one shown, below.
After choosing “PRODUCT” and pressing OK, a new dialogue box will appear where you may choose which cells should be multiplied. By selecting particular cells in the “Number1” and “Number2” boxes as shown below, you can do this for specific cells.
What is the formula would be in the cell E2Additionally, Excel contains many useful built-in functions that can perform calculations. The button shown by the “fx” sign next to the formula bar, “Insert Function,” can be used to access these the simplest way by clicking it.
Make sure the cells selected in the dialogue box are the proper ones because if you try to insert a formula in a cell using the Insert Formula button and there are adjacent cells containing numbers. Excel will frequently select those cells automatically.)
Therefore, by deciding a range of cells on the spreadsheet itself by clicking and dragging on the desired range of cells.
Learn more about cell E2 here:
https://brainly.com/question/6961706
#SPJ2
outline three difference each of a raster filled and vector file
Answer:
Unlike raster graphics, which are comprised of colored pixels arranged to display an image, vector graphics are made up of paths, each with a mathematical formula (vector) that tells the path how it is shaped and what color it is bordered with or filled by.
Explanation:
Write a program that uses input to prompt a user for their name and then welcomes them. Note that input will pop up a dialog box. Enter Sarah in the pop-up box when you are prompted so your output will match the desired output.
user_name = str (input = ("Please enter your name: "))
def greet (user_name):
print ("Welcome to your ghetto, {0}!".format(user_name) )
Over-activity on LinkedIn?
Answer:
Being over-enthusiastic and crossing the line always get you in trouble even if you’re using the best LinkedIn automation tool in the world.
When you try to hit the jackpot over the night and send thousands of connection requests in 24 hours, LinkedIn will know you’re using bots or tools and they will block you, temporarily or permanently.
This is clearly against the rules of LinkedIn. It cracks down against all spammers because spamming is a big ‘NO’ on LinkedIn.
What people do is that they send thousands of connection requests and that too with the same old spammy templates, “I see we have many common connections, I’d like to add you to my network.”
It will only create spam.
The LinkedIn algorithm is very advanced and it can easily detect that you’re using a bot or LinkedIn automation tool and you’ll be called out on it.
A life insurance salesperson who takes advantage of the foot-in-the-door phenomenon would be most likely to:________
a. emphasize that his company is one of the largest in the insurance industry.
b. promise a free gift to those who agree to purchase an insurance policy.
c. address customers by their first names.
d. ask customers to respond to a brief survey of their attitudes regarding life insurance.
Answer:
d. ask customers to respond to a brief survey of their attitudes regarding life insurance.
Explanation:
A life insurance policy can be defined as a contract between a policyholder and an insurer, in which the insurer agrees to pay an amount of money to a specific beneficiary either upon the death of the insured person (decedent) or after a set period of time.
A salesperson (sales representative) refers to an individual or employee who is saddled with the responsibility of taking orders from customers, as well as selling finished goods and services to consumers or end users.
A foot-in-the-door phenomenon can be defined as a compliance (persuasive) technique or tactics that assumes a person agreeing to perform a small request increases the likelihood of he or she agreeing to a subsequent larger request. Thus, it posits that when a person agrees to a small, it makes it difficult for him or her to decline a second, larger (bigger) request.
In this context, a life insurance salesperson who takes advantage of the foot-in-the-door phenomenon would most likely ask his or her customers to respond to a brief survey of their attitudes regarding life insurance.
python is an example of a low level programming language true or false?
write a programmimg code in c++ for school based grading system, the program should accept the subject in the number of students from a user and store their details in the array of type student(class) the student class you have:
1. number student name, index number remarks as variables of type string, marks as integer and grade as char.
2. avoid function called getData which is used to get student details
3. avoid function called calculate which will work on the marks and give the corresponding great and remarks as given below on
Marks 70-100 grade A remarks excellent Mark 60-69 Grade B remarks very good marks 50-59 grade C remarks pass maths 0-49 grade F remarks fail
Answer:
The program is as follows:
#include <iostream>
#include <string>
using namespace std;
class Student{
string studName, indexNo, remarks; int marks; char grade;
public:
void getData(){
cin.ignore();
cout<<"ID: "; getline(cin,indexNo);
cout<<"Name:"; getline(cin,studName);
cout<<"Marks: ";cin>>marks; }
void calculate(){
if(marks>=70 && marks<=100){
remarks ="Excellent"; grade = 'A'; }
else if(marks>=60 && marks<=69){
remarks ="Very Good"; grade = 'B'; }
else if(marks>=50 && marks<=59){
remarks ="Pass"; grade = 'D'; }
else{
remarks ="Fail"; grade = 'F'; }
cout << "Grade : " << grade << endl;
cout << "Remark : " << remarks << endl; }
};
int main(){
int numStudents;
cout<<"Number of students: "; cin>>numStudents;
Student students[numStudents];
for( int i=0; i<numStudents; i++ ) {
cout << "Student " << i + 1 << endl;
students[i].getData();
students[i].calculate(); }
return 0;}
Explanation:
This defines the student class
class Student{
This declares all variables
string studName, indexNo, remarks; int marks; char grade;
This declares function getData()
public:
void getData(){
cin.ignore();
Prompt and get input for indexNo
cout<<"ID: "; getline(cin,indexNo);
Prompt and get input for studName
cout<<"Name:"; getline(cin,studName);
Prompt and get input for marks
cout<<"Marks: ";cin>>marks; }
This declares funcion calculate()
void calculate(){
The following if conditions determine the remark and grade, respectively
if(marks>=70 && marks<=100){
remarks ="Excellent"; grade = 'A'; }
else if(marks>=60 && marks<=69){
remarks ="Very Good"; grade = 'B'; }
else if(marks>=50 && marks<=59){
remarks ="Pass"; grade = 'D'; }
else{
remarks ="Fail"; grade = 'F'; }
This prints the grade
cout << "Grade : " << grade << endl;
This prints the remark
cout << "Remark : " << remarks << endl; }
};
The main begins here
int main(){
This declares number of students as integer
int numStudents;
Prompt and get input for number of students
cout<<"Number of students: "; cin>>numStudents;
This calls the student object to declare array students
Student students[numStudents];
This is repeated for all students
for( int i=0; i<numStudents; i++ ) {
Print number
cout << "Student " << i + 1 << endl;
Call function to get data
students[i].getData();
Call function to calculate
students[i].calculate(); }
return 0;}
Give minimum computers configuration that can be used by a law firm.
Answer:
Processor: Intel i3, i5, or i7 processor or equivalent. Memory: 8 GB or more. Hard Disk Storage: 500 GB or more. Display: 13-inch or larger.
Explanation:
The lowest computers configuration that can be used are:
Operating System: such as MacOS 10.14. Windows 10 or higher version.Processor: such as Intel i3, i5, or i7 processor or others.Memory: 8 GB and more.Hard Disk Storage: 500 GB and more.Display: such as 13-inch or more.What is Configuration of a system?This is known to be the ways that the parts are said to be arranged to compose of the computer system.
Note that in the above case, The lowest computers configuration that can be used are:
Operating System: such as MacOS 10.14. Windows 10 or higher version.Processor: such as Intel i3, i5, or i7 processor or others.Memory: 8 GB and more.Hard Disk Storage: 500 GB and more.Display: such as 13-inch or more.Learn more about computers from
https://brainly.com/question/26021194
#SPJ9
The invention of the integrated circuit was the first major advance in computing. The integrated circuit made it possible for all of a computer's electrical components to reside on one silicon chip.
This invention became known as the __________.
personal computer
microprocessor
client-server configuration
mainframe computer
Answer:
micro processor
Explanation:
If Scheme were a pure functional language, could it include DISPLAY ? Why or why not?
Answer:
When Scheme is a pure functional language, it cannot include the function DISPLAY. Since the pure functional languages will return the same value whenever the same expression is evaluated, and the DISPLAY would be the output and thus it cannot be part of the purely functional language. Thus in the pure functional language we can evaluate the expressions with the same arguments and it returns the same value since there is no state to change.
Explanation:
You are the network administrator for the ABC Company. Your network consists of two DNS servers named DNS1 and DNS2. The users who are configured to use DNS2 complain because they are unable to connect to internet websites. The following shows the configuration of both servers:
Server Configurations:
DNS1: _msdcs.abc.comabc.com
DNS2: .(root)_msdcs.abc.comabc.com
The users connected to DNS2 need to be able to access the internet. What should be done?
Answer:
ABC Company
The action to take is to:
Delete the .(root) zone from the DNS2. Then configure conditional forwarding on the DNS2 server. If this is not done, the users will be unable to access the internet.
Explanation:
DNS forwarding enables DNS queries to be forwarded to a designated server, say DNS2, for resolution according to the DNS domain name. This stops the initial server, DNS1, that was contacted by the client from handling the query, thereby improving the network's performance and resilience and enabling the users to be connected to the DNS2 in order to access the internet.
Write a program that uses linear recursion to generate a copy of an original collection in which the copy contains duplicates of every item in the original collection. Using linear recursion, implement a function that takes a list as user-supplied runtime input and returns a copy of it in which every list item has been duplicated. Given an empty list the function returns the base case of an empty list.
Answer: b
Explanation:
Program using linear recursion to duplicate items in a list:
def duplicate_list(lst):
if not lst:
return []
else:
return [lst[0], lst[0]] + duplicate_list(lst[1:])
# Example usage
user_input = input("Enter a list of items: ").split()
original_list = [item for item in user_input]
duplicated_list = duplicate_list(original_list)
print("Duplicated list:", duplicated_list)
How can a program use linear recursion to duplicate items in a list?By implementing a function that utilizes linear recursion, we can create a copy of an original list with duplicated items. The function duplicate_list takes a list lst as input and checks if it is empty. If the list is empty, it returns an empty list as the base case.
Otherwise, it combines the first item of the list with itself and recursively calls the function with the remaining items (lst[1:]). The duplicated items are added to the resulting list. This process continues until all items in the original list have been duplicated and the duplicated list is returned.
Read more about linear recursion
brainly.com/question/31313045
#SPJ2
Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest combination of coins that the user has. For example, 27 cents is 1 quarter, 0 nickel, and 2 pennies. That is 27=1*25+0*5+2*1.
Example program run 1:
Enter number of cents: 185
Pennies: 0
Nickels: 0
Dimes: 1
Quarters: 7
Example program run 2:
Enter number of cents: 67
Pennies: 2
Nickels: 1
Dimes: 1
Answer:
The program in Python is as follows:
cents = int(input("Cents: "))
qtr = int(cents/25)
cents = cents - qtr * 25
dms = int(cents/10)
cents = cents - dms * 10
nkl = int(cents/5)
pny = cents - nkl * 5
print("Pennies: ",pny)
print("Nickels: ",nkl)
print("Dimes: ",dms)
print("Quarters: ",qtr)
Explanation:
The program in Python is as follows:
cents = int(input("Cents: "))
This calculate the number of quarters
qtr = int(cents/25)
This gets the remaining cents
cents = cents - qtr * 25
This calculates the number of dimes
dms = int(cents/10)
This gets the remaining cents
cents = cents - dms * 10
This calculates the number of nickels
nkl = int(cents/5)
This calculates the number of pennies
pny = cents - nkl * 5
The next 4 lines print the required output
print("Pennies: ",pny)
print("Nickels: ",nkl)
print("Dimes: ",dms)
print("Quarters: ",qtr)
Calculate the total time required to transfer a 500KB file in the following cases. Assume an RTT of 50ms, a packet size of 2KB, and an initial 2xRTT of handshaking before data is sent. A. If the bandwidth is 2Mbps, what is the Bandwidth-Delay Product (BDP)
Answer:
i) Total time = 2457.73 secs
ii) BDP = 0.01 Mbyte
Explanation:
Packet size : 2 Kb = ( 2 * 8192 ) bits = 16384 bits
Bandwidth : 2Mbps = 2,000,000 bits/sec
RTT = 50 ms = 0.050 secs
i) Determine total time required to transfer 500 kB
= Initial handshake + Time for transmission of all files + propagation delay
= 2 x RTT + Time for transmission + RTT /2
Total time = ( 2 * 0.05 ) + (1500 * 1.6384 )+ ( 0.050 / 2 ) = 2457.73 secs
ii) Determine the Bandwidth-delay product
= data link capacity * RTT
= 2 Mbps * 50 ms = 100,000 = 0.01 MByte
Write an algorithm to solve general formula?
Answer:
2+2=4
Explanation:
simple math cause of that bubye
different types of computer and state the major difference between them
Answer:
computers system may be classified according to their size.
four types of computers are;
microcomputers / personal computers- micro computers are also called personal computers which is PC this computer came in different shapes size and colors. a personal computers are designed to be used by one person at a time.some examples of the computer are;
laptopdesktopa palmtopa work station2. mini computers- mini computers are sometimes called mid-range computers which are more powerful than microcomputers and can support a number of users performing different tasks, they were originally developed to perform specific tasks such as engineering calculations.
3. Mainframe computers- Mainframe computers are larger systems that can handle numberous users, store large amounts of data and process transaction at a high rate. these computers are expensive and powerful.
4. super computers- super computers are the most largest, fastest and most powerful computer. this systems are able to process hundreds of million of instructions per second they are used for job requiring and long complex calculation.