Write a Bash script that searches all .c files in the current directory (and its subdirectories, recursively) for occurrences of the word "foobar". Your search should be case-sensitive (that applies both to filenames and the word "foobar"). Note that an occurrence of "foobar" only counts as a word if it is either at the beginning of the line or preceded by a non-word-constituent character, or, similarly, if it is either at the end of the line or followed by a non-word- constituent character. Word-constituent characters are letters, digits and underscores.

Answers

Answer 1

Answer:

grep -R  '^foobar'.c > variable && grep -R  'foobar$'.c >> variable

echo $variable | ls -n .

Explanation:

Bash scripting is a language used in unix and linux operating systems to interact and automate processes and manage files and packages in the system. It is an open source scripting language that has locations for several commands like echo, ls, man etc, and globbing characters.

The above statement stores and appends data of a search pattern to an already existing local variable and list them numerically as standard out 'STDOUT'.


Related Questions

a reason for giving a Page Quality (PQ) rating of Highest, is it the page has no Ads?

Answers

Answer:

quality of highest giving page hash no adds

Assign a variable solveEquation with a function expression that has three parameters (x, y, and z) and returns the result of evaluating the expression Z-y + 2 * x. 2 /* Your solution poes here */ 4 solveEquation(2, 4, 5.5); // Code will be tested once with values 2, 4, 5.5 and again with values -5, 3, 8

Answers

Answer:

The programming language is not stated;

However, the program written in Python is as follows

def solveEquation(x,y,z):

     result = z - y + 2 * x

     print(result)

x = float(input("x = "))

y = float(input("y = "))

z = float(input("z = "))

print(solveEquation(x,y,z))

Explanation:

This line defines the function solveEquation

def solveEquation(x,y,z):

This line calculates the expression in the question

     result = z - y + 2 * x

This line returns the result of the above expression

     print(result)

The next three lines prompts user for x, y and z

x = float(input("x = "))

y = float(input("y = "))

z = float(input("z = "))

This line prints the result of the expression

print(solveEquation(x,y,z))

Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer CPU

Answers

Answer:

mouse printer CPU touch screen

Explanation:

on a tablet computer hope this helps you :)

Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a foot. Sample output with inputs: 58 Total inches: 68 def print_total_inches (num_feet, hum_inches): 2 str1=12 str2=num_inches 4 print("Total inches:',(num_feet*strl+str2)) 5 print_total_inches (5,8) 6 feet = int(input) 7 inches = int(input) 8 print_total_inches (feet, inches)

Answers

I'll pick up your question from here:

Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a foot.

Sample output with inputs: 5 8

Total inches: 68

Answer:

The program is as follows:

def print_total_inches(num_feet,num_inches):

     print("Total Inches: "+str(12 * num_feet + num_inches))

print_total_inches(5,8)

inches = int(input("Inches: "))

feet = int(input("Feet: "))

print_total_inches(feet,inches)

Explanation:

This line defines the function along with the two parameters

def print_total_inches(num_feet,num_inches):

This line calculates and prints the equivalent number of inches

     print("Total Inches: "+str(12 * num_feet + num_inches))

The main starts here:

This line tests with the original arguments from the question

print_total_inches(5,8)

The next two lines prompts user for input (inches and feet)

inches = int(input("Inches: "))

feet = int(input("Feet: "))

This line prints the equivalent number of inches depending on the user input

print_total_inches(feet,inches)

Answer:

Written in Python:

def print_total_inches(num_feet,num_inches):

    print("Total inches: "+str(12 * num_feet + num_inches))

feet = int(input())

inches = int(input())

print_total_inches(feet, inches)

Explanation:

While it might be considered "old-school," which action should you take if you are unsure how a page will print, even after looking at Page Break Preview?a) Slide the solid blue line.b) Slide the dotted line.c) Print the first page.d) Eliminate page breaks.

Answers

Answer:

The correct answer is D

In the case of printing pages when you are not sure of the number of the page the printer will print you should leave some gaps or margins or leave space between the two pages.

The old-school way to do this is by Printing the first page. Hence the option C is correct.

Learn more bout the might be considered "old-school,".

brainly.com/question/26057812.

Why MUST you request your DSO signed I-20 ship as soon as it is ready and who is responsible to request the I-20

Answers

Why MUST you request your DSO signed I-20 ship as soon as it is ready and who is responsible to request the I-20?

a. It is required you have an endorsed/signed I-20 when Customs and Border Patrol or police ask for it

b. We only keep an unsigned digital copy and cannot sign an I-20 after the fact

c. It is against U.S. regulations to send digital (signed or not) DS-2019s and must treat I-20s the same

d. You will need all signed original I-20s to make copies to apply for OPT, STEM and H-1B in the future, so get them now!

e. It is the student’s choice to request each term, however, we cannot go back retroactively to provide past copies

f. We can only provide a signed copy of current I-20 and if changes occur from previous semesters that information will not show

g. The original endorsed I-20 signed by a DSO will be destroyed after 30 days of issuance if not picked up, and it cannot be replicated

h. The cost to have I-20 shipped may go up at any time

i. All the above

Answer:

i. All the above

Explanation:

DSO means designated school officials and they have to do with Student and Exchange Visitor Program (SEVP)-certified schools where students have to get a Form I-20, “Certificate of Eligibility for Nonimmigrant Student Status which provides information about the student's F or M status.

What a student must request for from his DSO signed I-20 ship are all the above options.

After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO).
A. UDP 53
B. UDP 67
C. UDP 68
D. TCP 53
E. TCP 67
F. TCP 68

Answers

Answer:

B. UDP 67

C. UDP 68

Explanation:

In this scenario, after a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. The ports that would need to be opened on the firewall to allow the users to obtain an IP address are both the UDP 67 and UDP 68. UDP is an acronym for user datagram protocol in computer networking and it is part of the transmission control protocol/internet protocol (TCP/IP) suite.

Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.

Also, the UDP 67 and 68 ports is responsible for the connectionless framework which is typically being used by the dynamic host configuration protocol (DHCP) that is used to assign IP addresses to various computer users and manage their leases.

UDP 67 is the destination port for a DHCP server while the UDP 68 is the port number for the computer user (client).

Hence, for the users to have access to the internet or internet connectivity both UDP 67 and 68 must be opened on the firewall.

As an ICT student teacher using convincing and cogent reasons explain why you think operating system is pivotal in teaching and learning

Answers

Answer:

An operating system (OS) is a software which is responsible for the management of computer hardware, software, and also provides common services for computer programs.

Operating System is pivotal in teaching and learning because:

1. It enables computer programs to run smoothly on various computer devices.

2. The Operating System gives teachers the opportunity to install learning apps on their devices for ease of teaching.

3. It enables students to download and install learning applications, download and upload assignments, etc.

4. The Operating System makes video conferencing for online tuition easy and smooth.

5. It makes computer users to interact with other applications and softwares within a device.

Operating systems are found on many computer devices e.g: mobile phones, video games, PCs, supercomputers, etc.

A computer uses a programmable clock in square-wav e mode. If a 500 MHz crystal is used, what should be the value of the holding register to achieve a clock resolution of (a) a millisecond (a clock tick once every millisecond)

Answers

Answer:

500,000

Explanation:

A computer uses a programmable clock in square-wave mode. If a 500 MHz crystal is used, what should be the value of the holding register to achieve a clock resolution of (a) a millisecond (a clock tick once every millisecond)

1 millisecond = 1 million second = 1,000,000

For a 500 MHz crystal, Counter decrement = 2

Therefore value of the holding register to a clock resolution of 1,000,000 seconds :

1,000,000/2 = 500,000

Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. Sample output with inputs: 4.5 2.1 3.0

Answers

Answer:

def pyramid_volume(base_length,base_width,pyramid_height):

      return base_length * base_width * pyramid_height/3

length = float(input("Length: "))

width = float(input("Width: "))

height = float(input("Height: "))

print("{:.2f}".format(pyramid_volume(length,width,height)))

Explanation:

This line declares the function along with the three parameters

def pyramid_volume(base_length,base_width,pyramid_height):

This line returns the volume of the pyramid

      return base_length * base_width * pyramid_height/3

The main starts here

The next three lines gets user inputs for length, width and height

length = float(input("Length: "))

width = float(input("Width: "))

height = float(input("Height: "))

This line returns the volume of the pyramid in 2 decimal places

print("{:.2f}".format(pyramid_volume(length,width,height)))

Define a function group-by-nondecreasing, which takes in a stream of numbers and outputs a stream of lists, which overall has the same numbers in the same order, but grouped into segments that are non-decreasing.

Answers

Answer:

def group_by_nondecreasing( *args ) :

     num_list = [arg for arg in args]

     sorted_numlist = sorted( num_list )

     list_stream = [ sorted_numlist, sorted_numlist, sorted_numlist ]

     return list_stream

Explanation:

This python function has the ability to accept multiple and varying amount of arguments. the list comprehension shorten the logical for statement to generate a list of numbers, sorts the list in ascending order by default and duplicates the list in another list.

Implement the generator function scale(s, k), which yields elements of the given iterable s, scaled by k. As an extra challenge, try writing this function using a yield from statement!


def scale(s, k):


"""Yield elements of the iterable s scaled by a number k.


>>> s = scale([1, 5, 2], 5)


>>> type(s)



>>> list(s)


[5, 25, 10]


>>> m = scale(naturals(), 2)


>>> [next(m) for _ in range(5)]


[2, 4, 6, 8, 10]


"""

Answers

Answer:

The generator function using yield from:

def scale(s, k):

   yield from map(lambda x: x * k, s)

Another way to implement generator function that works same as above using only yield:

def scale(s, k):

  for i in s:

       yield i * k

Explanation:

The complete program is:

def scale(s, k):

   """Yield elements of the iterable s scaled by a number k.  

   >>> s = scale([1, 5, 2], 5)

   >>> type(s)

   <class 'generator'>

   >>> list(s)

   [5, 25, 10]  

   >>> m = scale(naturals(), 2)

   >>> [next(m) for _ in range(5)]

   [2, 4, 6, 8, 10]

   """

   yield from map(lambda x: x * k, s)

If you want to see the working of the above generator function scale() as per mentioned in the above comments, use the following statements :

s = scale([1, 5, 2], 5)  

print(type(s))  

#The above print statement outputs:

#<class 'generator'>

print(list(s))

#The above print statement outputs a list s with following items:

#[5, 25, 10]                                                                                                                    

The function def scale(s, k): is

def scale(s, k):

   yield from map(lambda x: x * k, s)    

This function takes two parameters i.e. s and k and this function yields elements of the given iterable s, scaled by k.

In this statement:    yield from map(lambda x: x * k, s)    

yield from is used which allows to refactor a generator in a simple way by splitting up generator into multiple generators.

The yield from is used inside the body of a generator function.

The lambda function is a function that has any number of arguments but can only have one expression. This expression is evaluated to an iterable from which an iterator will be extracted. This iterator yields and receives values to or from the caller of the generator. Here the expression is x: x * k and iterable is s. This expression multiplies each item to k.

map() method applies the defined function for each time in an iterable.

The generator function can also be defined as:

def scale(s, k):

  for i in s:

       yield i * k

For the above example

s = scale([1, 5, 2], 5)  

def scale(s,k): works as follows:

s = [1, 5, 2]

k = 5

for loop iterates for each item i in iterable s and yields i*k

i*k multiplies each element i.e 1,5 and 2 to k=5 and returns a list

At first iteration, for example, i*k = 1 * 5 = 5, next iteration i*k = 5*5 = 25 and last iteration i*k = 2*5 = 10. So the output. So

s = scale([1, 5, 2], 5)  In this statement now s contains 5, 25 and 10

print(list(s))  prints the values of s in a list as: [5, 25, 10] So output is:

[5, 25, 10]

All of the following are extra precautions you can take to secure a wireless network EXCEPT ________. change your network name (SSID) enable SSID broadcast turn on security protocols create a passphrase

Answers

Answer:

Enable SSID broadcast

Explanation:

All of the following are extra precautions you can take to secure a wireless network except enable SSID broadcast. The correct option is B.

What is SSID broadcast?

When people in the area try to join their wireless devices, the name of your network is listed in the list of available networks thanks to broadcasting the SSID.

You can stop SSID broadcasting if you don't want arbitrary wireless devices attempting to connect to your network.

Home networks don't need to have a visible SSID unless they have many access points that devices can switch between.

If your network just has a single router, disabling this function means giving up the ease of adding new home network customers in exchange for certain security gains.

Apart from enabling SSID broadcast, there are other security measures you may take to protect a wireless network.

Thus, the correct option is B.

For more details regarding SSID broadcast, visit:

https://brainly.com/question/13191413

#SPJ6

Draw the binary search tree that results from starting with an empty tree and
a. adding 50 72 96 94 26 12 11 9 2 10 25 51 16 17 95
b. adding 95 17 16 51 25 10 2 9 11 12 26 94 96 72 50
c. adding 10 72 96 94 85 78 80 9 5 3 1 15 18 37 47
d. adding 50 72 96 94 26 12 11 9 2 10, then removing 2 and 94
e. adding 50 72 96 94 26 12 11 9 2 10, then removing 50 and 26
f. adding 50 72 96 94 26 12 11 9 2 10, then removing 12 and 72

Answers

Answer:

See the attached document for answer.

Explanation:

See the attached document for the explanation.  

                 

           

               

Consider the following calling sequences and assuming that dynamic scoping is used, what variables are visible during execution of the last function called? Include with each visible variable the name of the function in which it was defined.a. Main calls fun1; fun1 calls fun2; fun2 calls fun3b. Main calls fun1; fun1 calls fun3c. Main calls fun2; fun2 calls fun3; fun3 calls fun1d. Main calls fun3; fun3 calls fun1e. Main calls fun1; fun1 calls fun3; fun3 calls fun2f. Main calls fun3; fun3 calls fun2; fun2 calls fun1void fun1(void);void fun2(void);void fun3(void);void main() {Int a,b,c;…}void fun1(void){Int b,c,d;…}void fun2(void){Int c,d,e;…}void fun3(void){Int d,e,f;…}

Answers

Answer:

In dynamic scoping the current block is searched by the compiler and then all calling functions consecutively e.g. if a function a() calls a separately defined function b() then b() does have access to the local variables of a(). The visible variables with the name of the function in which it was defined are given below.

Explanation:

In main() function three integer type variables are declared: a,b,c

In fun1() three int type variables are declared/defined: b,c,d

In fun2() three int type variables are declared/defined: c,d,e

In fun3() three int type variables are declared/defined: d,e,f

a. Main calls fun1; fun1 calls fun2; fun2 calls fun3

Here the main() calls fun1() which calls fun2() and fun2() calls func3() . This means first the func3() executes, then fun2(), then fun1() and last main()

Visible Variable:  d, e, f        Defined in: fun3

Visible Variable: c                 Defined in: fun2 (the variables d and e of fun2  

                                                                                                     are not visible)

Visible Variable: b                  Defined in: fun1 ( c and d of func1 are hidden)

Visible Variable: a                 Defined in: main (b,c are hidden)

b. Main calls fun1; fun1 calls fun3

Here the main() calls fun1, fun1 calls fun3. This means the body of fun3 executes first, then of fun1 and then in last, of main()

Visible Variable: d, e, f           Defined in: fun3

Visible Variable:  b, c              Defined in: fun1 (d not visible)

Visible Variable:  a                  Defined in: main ( b and c not visible)

c. Main calls fun2; fun2 calls fun3; fun3 calls fun1

Here the main() calls fun2, fun2 calls fun3 and fun3 calls fun1. This means the body of fun1 executes first, then of fun3, then fun2 and in last, of main()

Visible Variable:  b, c, d        Defined in: fun1

Visible Variable:  e, f             Defined in: fun3 ( d not visible)

Visible Variable:  a                Defined in: main ( b and c not visible)

Here variables c, d and e of fun2 are not visible

d. Main calls fun3; fun3 calls fun1

Here the main() calls fun3, fun3 calls fun1. This means the body of fun1 executes first, then of fun3 and then in last, of main()

Visible Variable: b, c, d     Defined in: fun1  

Visible Variable:   e, f        Defined in:  fun3   ( d not visible )

Visible Variable:    a          Defined in: main (b and c not visible)

e. Main calls fun1; fun1 calls fun3; fun3 calls fun2

Here the main() calls fun1, fun1 calls fun3 and fun3 calls fun2. This means the body of fun2 executes first, then of fun3, then of fun1 and then in last, of main()

Visible Variable: c, d, e        Defined in: fun2

Visible Variable:  f               Defined in: fun3 ( d and e not visible)

Visible Variable:  b               Defined in:  fun1 ( c and d not visible)

Visible Variable: a                Defined in: main ( b and c not visible)

f. Main calls fun3; fun3 calls fun2; fun2 calls fun1

Here the main() calls fun3, fun3 calls fun2 and fun2 calls fun1. This means the body of fun1 executes first, then of fun2, then of fun3 and then in last, of main()

Visible Variable: b, c, d       Defined in: fun1  

Visible Variable: e               Defined in: fun2  

Visible Variable: f                Defined in: fun3  

Visible Variable: a               Defined in: main

why you think Operating System is pivotal in teaching and learning.

Answers

Answer:

An Operating System is pivotal in teaching and learning because:

1. It enables computer users to communicate with the hardware.

2. To run any computer programme successfully, the Operating System is basic.

3. It provides a smooth interface for teachers to use video conferencing or other conferencing systems in teaching their students.

4. The OS enables the launching of other learning packages on a computer system.

5. Students can install learning apps on their systems with the help of the OS.

Explanation:

An Operating System is a software which brings about easy communication with the hardware and enablea other programs to run on the computer easily. It provides basic functionality in systems were they are installed.

Briefly describe the importance of thoroughly testing a macro before deployment. What precautions might you take to ensure consistency across platforms for end users?

Answers

Answer:

Answered below

Explanation:

A macro or macroinstruction is a programmable pattern which translates a sequence of inputs into output. It is a rule that specifies how a certain input sequence is mapped to a replacement output sequence. Macros makes tasks less repetitive by representing complicated keystrokes, mouse clicks and commands.

By thoroughly testing a macro before deployment, you are able to observe the flow of the macro and also see the result of each action that occurs. This helps to isolate any action that causes an error or produces unwanted results and enable it to be consistent across end user platforms.

What is the quick key to highlighting a column?
Ctrl + down arrow
Ctrl + Shift + down arrow
Right-click + down arrow
Ctrl + Windows + down arrow

Answers

The quick key to highlighting a column is the Ctrl + Shift + down arrow. Thus, option (b) is correct.

What is column?

The term column refers to how data is organized vertically from top to bottom. Columns are groups of cells that are arranged vertically and run from top to bottom. A column is a group of cells in a table that are vertically aligned. The column is the used in the excel worksheet.

The quick key for highlighting a column is Ctrl + Shift + down arrow. To select downward, press Ctrl-Shift-Down Arrow. To pick anything, use Ctrl-Shift-Right Arrow, then Ctrl-Shift-Down Arrow. In the Move/Highlight Cells, the was employed. The majority of the time, the excel worksheet was used.

As a result, the quick key to highlighting a column is the Ctrl + Shift + down arrow. Therefore, option (b) is correct.

Learn more about the column, here:

https://brainly.com/question/3642260

#SPJ6

Answer:

its (B) ctrl+shift+down arrow

hope this helps <3

Explanation:

Where can you find detailed information about your registration, classes, finances, and other personal details? This is also the portal where you can check your class schedule, pay your bill, view available courses, check your final grades, easily order books, etc. A. UC ONE Self-Service Center B. Webmail C. UC Box Account D. ILearn

Answers

Answer:

A. UC ONE Self-Service Center

Explanation:

The UC ONE Self-Service Center is an online platform where one can get detailed information about registration, classes, finances, and other personal details. This is also the portal where one can check class schedule, bill payment, viewing available courses, checking final grades, book ordering, etc.

it gives students all the convenience required for effective learning experience.

The UC ONE platform is a platform found in the portal of University of the Cumberland.

Given an integer n and an array a of length n, your task is to apply the following mutation to a:
Array a mutates into a new array b of length n.
For each i from 0 to n - 1, b[i] = a[i - 1] + a[i] + a[i + 1].
If some element in the sum a[i - 1] + a[i] + a[i + 1] does not exist, it should be set to 0. For example, b[0] should be equal to 0 + a[0] + a[1].
Example
For n = 5 and a = [4, 0, 1, -2, 3], the output should be mutateTheArray(n, a) = [4, 5, -1, 2, 1].
b[0] = 0 + a[0] + a[1] = 0 + 4 + 0 = 4
b[1] = a[0] + a[1] + a[2] = 4 + 0 + 1 = 5
b[2] = a[1] + a[2] + a[3] = 0 + 1 + (-2) = -1
b[3] = a[2] + a[3] + a[4] = 1 + (-2) + 3 = 2
b[4] = a[3] + a[4] + 0 = (-2) + 3 + 0 = 1
So, the resulting array after the mutation will be [4, 5, -1, 2, 1].
Input/Output
[execution time limit] 3 seconds (java)
[input] integer n
An integer representing the length of the given array.
Guaranteed constraints:
1 ≤ n ≤ 103.
[input] array.integer a
An array of integers that needs to be mutated.
Guaranteed constraints:
a.length = n,
-103 ≤ a[i] ≤ 103.
[output] array.integer
The resulting array after the mutation.

Answers

Answer:

The program written in Java is as follows

import java.util.Scanner;

public class mutilate {

public static void main(String [] args) {

Scanner input = new Scanner(System.in);

int n;

System.out.print("Array Length: ");

n = input.nextInt();

while(n<1 || n > 103)  {

    System.out.print("Array Length: ");

n = input.nextInt();

}

int a []= new int [n];

int b []= new int [n];

System.out.print("Enter Elements of the Array: ");

for(int i =0;i<n;i++)  {

 a[i] = input.nextInt();

}

System.out.print("Output: ");

for(int i =0;i<n;i++)  {

 if(i == 0)   {

     b[i] = 0+a[i]+a[i+1];

 }

 else if(i == n-1)   {

     b[i] = a[i - 1]+a[i]+0;

 }

 else   {

 b[i] = a[i - 1]+a[i]+a[i+1];    

 }

 System.out.print(b[i]+" ");

}

}

}

Explanation:

This line allows the program accepts user input

Scanner input = new Scanner(System.in);

This line declares integer n

int n;

The next two line prompts user for length of the array and also accepts input

System.out.print("Array Length: ");

n = input.nextInt();

The following while iteration ensures that the user input is between 1 and 103

while(n<1 || n > 103)  {

    System.out.print("Array Length: ");

n = input.nextInt();

}

The next two lines declares array a and b

int a []= new int [n];

int b []= new int [n];

The next for iteration allows user enter values for array a

System.out.print("Enter Elements of the Array: ");

for(int i =0;i<n;i++)  {

 a[i] = input.nextInt();

}

The next for iteration calculates and prints the values for array b based on the instruction in the question

System.out.print("Output: ");

for(int i =0;i<n;i++)  {

 if(i == 0)   {

     b[i] = 0+a[i]+a[i+1];

 }

 else if(i == n-1)   {

     b[i] = a[i - 1]+a[i]+0;

 }

 else   {

 b[i] = a[i - 1]+a[i]+a[i+1];    

 }

 System.out.print(b[i]+" ");

}

Karl from Accounting is in a panic. He is convinced that he has identified malware on the servers—a type of man-in-the-middle attack in which a Trojan horse manipulates calls between the browser and yet still displays back the user's intended transaction. What type of attack could he have stumbled on?

Answers

Answer:

The correct answer will be "Man-in-the-browser".

Explanation:

Man-in-the-browser seems to be a category of person-in-the-middle attack where a certain Trojan horse tries to misrepresent calls between some of the web pages and therefore it is prevention systems while still demonstrating the intentional transfer of funds back to the customer.High-tech as well as high-amount technology for starting a man throughout the internet explorer assaults.

var tax = .07;

var getCost = function(itemCost, numItems) {

var subtotal = itemCost * numItems;

var tax = 0.06;

var total = subtotal + subtotal * tax;

return (total);

}

var totalCost = getCost(25.00, 3);

alert("Your cost is $" + totalCost.toFixed(2) + " including a tax of " +

tax.toFixed(2));


Which variable represents the function expression?


a. totalCost

b. getCost

c. itemCost

d. total

Answers

Answer:

b. getCost

Explanation:

Javascript is a multi-purpose programming language, used in applications like web development, software development and embedded system programming, data visualization and analysis, etc.

Its regular syntax defines variables with the "var" keyword and with additional ecmascript rules, the "let" and "const" keywords as well. function definition uses the keyword "function" with parenthesis for holding arguments. The code block of a function is written between two curly braces and returns a value stored in a variable with the return keyword.

The variable can now be called with the parenthesis and required arguments. Note that only anonymous functions can assigned to a variable.

Generating a signature with RSA alone on a long message would be too slow (presumably using cipher block chaining). Suppose we could do division quickly. Would it be reasonable to compute an RSA signature on a long message by first finding what the message equals (taking the message as a big integer), mod n, and signing that?

Answers

Answer:

Following are the algorithm to this question:

Explanation:

In the RSA algorithm can be defined as follows:  

In this algorithm, we select two separate prime numbers that are the "P and Q", To protection purposes, both p and q combines are supposed to become dynamically chosen but must be similar in scale but 'unique in length' so render it easier to influence. Its value can be found by the main analysis effectively.  

Computing N = PQ.  

In this, N can be used for key pair, that is public and private together as the unit and the Length was its key length, normally is spoken bits. Measure,

[tex]\lambda (N) = \ lcm( \lambda (P), \lambda (Q)) = \ lcm(P- 1, Q - 1)[/tex]  where [tex]\lambda[/tex] is the total function of Carmichaels. It is a privately held value. Selecting the integer E to be relatively prime from [tex]1<E < \lambda (N)[/tex]and [tex]gcd(E, \lambda (N) ) = 1;[/tex] that is [tex]E \ \ and \ \ \lambda (N)[/tex].  D was its complex number equivalent to E (modulo [tex]\lambda (N)[/tex] ); that is d was its design multiplicative equivalent of E-1.  

It's more evident as a fix for d provided of DE ≡ 1 (modulo [tex]\lambda (N)[/tex] ).E with an automatic warning latitude or little mass of bigging contribute most frequently to 216 + 1 = 65,537 more qualified encrypted data.

In some situations it's was shown that far lower E values (such as 3) are less stable.  

E is eligible as a supporter of the public key.  

D is retained as the personal supporter of its key.  

Its digital signature was its module N and the assistance for the community (or authentication). Its secret key includes that modulus N and coded (or decoding) sponsor D, that must be kept private. P, Q, and [tex]\lambda (N)[/tex] will also be confined as they can be used in measuring D. The Euler totient operates [tex]\varphi (N) = (P-1)(Q - 1)[/tex] however, could even, as mentioned throughout the initial RSA paper, have been used to compute the private exponent D rather than λ(N).

It applies because [tex]\varphi (N)[/tex], which can always be split into  [tex]\lambda (N)[/tex], and thus any D satisfying DE ≡ 1, it can also satisfy (mod  [tex]\lambda (N)[/tex]). It works because [tex]\varphi (N)[/tex], will always be divided by [tex]\varphi (N)[/tex],. That d issue, in this case, measurement provides a result which is larger than necessary (i.e. D >   [tex]\lambda (N)[/tex] ) for time - to - time). Many RSA frameworks assume notation are generated either by methodology, however, some concepts like fips, 186-4, may demand that D<   [tex]\lambda (N)[/tex]. if they use a private follower D, rather than by streamlined decoding method mostly based on a china rest theorem. Every sensitive "over-sized" exponential which does not cooperate may always be reduced to a shorter corresponding exponential by modulo  [tex]\lambda (N)[/tex].

As there are common threads (P− 1) and (Q – 1) which are present throughout the [tex]N-1 = PQ-1 = (P -1)(Q - 1)+ (P-1) + (Q- 1))[/tex], it's also possible, if there are any, for all the common factors [tex](P -1) \ \ \ and \ \ (Q - 1)[/tex]to become very small, if necessary.  

Indication: Its original writers of RSA articles conduct their main age range by choosing E as a modular D-reverse (module [tex]\varphi (N)[/tex]) multiplying. Because a low value (e.g. 65,537) is beneficial for E to improve the testing purpose, existing RSA implementation, such as PKCS#1, rather use E and compute D.

Suppose that a class named ClassA contains a private nonstatic integer named b, a public nonstatic integer named c, and a public static integer named d. Which of the following are legal statements in a class named ClassB that has instantiated an object as ClassA obA =new ClassA();?

a. obA.b 12;
b. obA.c 5;
c. obA.d 23;
d. ClassA.b=23;
e. ClassA.c= 33;
f. ClassA.d= 99;

Answers

Answer:

b. obA.c 5;

d. ClassA.b=23;

f. ClassA.d = 99;

Explanation:

Java is a programming language for object oriented programs. It is high level programming language developed by Sun Microsystems. Java is used to create applications that can run on single computer. Static variable act as global variable in Java and can be shared among all objects. The non static variable is specific to instance object in which it is created.

Write a program that reads in your question #2 Python source code file and counts the occurrence of each keyword in the file. Your program should prompt the user to enter the Python source code filename

Answers

Answer:

Here is the Python program:

import keyword  #module that contains list of keywords of python

filename = input("Enter Python source code filename: ") # prompts user to enter the filename of a source code

code = open(filename, "r") # opens the file in read mode

keywords = keyword.kwlist #extract list of all keywords of Python and stored it into keywords

dictionary = dict() #creates a dictionary to store each keyword and its number of occurrence in source code

for statement in code: # iterates through each line of the source code in the file

   statement = statement.strip() # removes the spaces in the statement of source code  

   words = statement.split(" ") #break each statement of the source code into a list of words by empty space separator

   for word in words:# iterates through each word/item of the words list  

       if word in keywords:#checks if word in the code is present in the keywords list of Python  

           if word in dictionary: #checks if word is already present in the dictionary

               dictionary[word] = dictionary[word] + 1 #if word is present in dictionary add one to the count of the existing word

           else: #if word is not already present in the dictionary  

               dictionary[word] = 1 #add the word to the dictionary and set the count of word to 1

for key in list(dictionary.keys()): #iterates through each word in the list of all keys in dictionary  

   print(key, ":", dictionary[key])# prints keyword: occurrences in key:value format of dict

Explanation:

The program is well explained in the comments attached with each line of the program.  

The program prompts the user to enter the name of the file that contains the Python source code. Then the file is opened in read mode using open() method.

Then the keyword.kwlist statement contains the list of all keywords of Python. These are stored in keywords.

Then a dictionary is created which is used to store the words from the source code that are the keywords along with their number of occurrences in the file.

Then source code is split into the lines (statements) and the first for loop iterates through each line and removes the spaces in the statement of source code .

Then the lines are split into a list of words using split() method. The second for loop is used to iterate through each word in the list of words of the source code. Now each word is matched with the list of keywords of Python that is stored in keywords. If a word in the source code of the file is present in the keywords then that word is added to the dictionary and the count of that word is set to 1. If the word is already present in the dictionary. For example if there are 3 "import" keywords in the source code and if 1 of the import keywords is already in the dictionary. So when the second import keyword is found, then the count of that keyword is increased by 1 so that becomes 2.

Then the last loop is used to print each word of the Python that is a keyword along with its number of occurrences in the file.

The program and its output is attached in a screenshot. I have used this program as source code file.

CHALLENGE ACTIVITY 3.1.2: Type casting: Computing average owls per zoo.
Assign avg_owls with the average owls per zoo. Print avg_owls as an integer. Sample output for inputs: 1 2 4
Average owls per zoo: 2
1. num owls zooA= 1
2. num owls zooB = 2
3. numowlszooC = 4 -
4. num-zoos = 3
5. avg-owls 0.0
6.
7. Your solution goes here" Run
8.

Answers

Answer:

num_owls_zooA = 1

num_owls_zooB = 2

num_owls_zooC = 4

num_zoos = 3

avg_owls = 0.0

avg_owls = (num_owls_zooA + num_owls_zooB + num_owls_zooC) / num_zoos

print("Average owls per zoo: " + str(int(avg_owls)))

Explanation:

Initialize the num_owls_zooA, num_owls_zooB, num_owls_zooC as 1, 2, 4 respectively

Initialize the num_zoos as 3 and avg_owls as 0

Calculate the avg_owls, sum num_owls_zooA, num_owls_zooB, num_owls_zooC and divide the result by num_zoos

Print the avg_owls as an integer (Type cast the avg_owls to integer, int(avg_owls))

Assume the existence of a Phone class. Define a derived class, CameraPhone that contains two data members: an integer named, imageSize, representing the size in megabytes of each picture, and an integer named memorySize, representing the number of megabytes in the camera's memory. There is a constructor that accepts two integer parameters corresponding to the above two data members and which are used to initialize the respective data members. There is also a function named numPictures that returns (as an integer) the number of pictures the camera's memory can hold.

Answers

#include <iostream>

using namespace std;

class CameraPhone:Phone{

int imageSize,memorySize;

public:

CameraPhone(int image_size,int memory_size):imageSize(image_size),memorySize(memory_size){}

int numPictures(){

return memorySize-imageSize;

}

}

int main(){}

Here is the code for the derived class, CameraPhone:

class Phone:

 def __init__(self, brand, model, price):    self.brand = brand    self.model = model    self.price = price

class CameraPhone(Phone):

 def __init__(self, brand, model, price, imageSize, memorySize):    super().__init__(brand, model, price)    self.imageSize = imageSize    self.memorySize = memorySize

 def numPictures(self):

   return self.memorySize // self.imageSize

What are the derived class?

This code defines a derived class, CameraPhone, that inherits from the Phone class. The CameraPhone class has two additional data members: imageSize and memorySize. The constructor for the CameraPhone class takes two additional parameters corresponding to these data members. The numPictures() function returns the number of pictures that the camera's memory can hold.

Here is an example of how to use the CameraPhone class:

phone = CameraPhone("Apple", "iPhone 13 Pro", 1000, 10, 100)

print(phone.numPictures())

# Output: 10

This code will print the number of pictures that the camera's memory can hold, which is 10 in this case.

Find out more on derived class here: https://brainly.com/question/31942927

#SPJ2

If our HMap implementation is used (load factor of 75% and an initial capacity of 1,000), how many times is the enlarge method called if the number of unique entries put into the map is:_______

a. 100
b. 750
c. 2,000
d. 10,000
e. 100,000

Answers

Answer:

A) for 100 : < 1 times

b) for 750 : < 1 times

c) For 2000 = 1 time

D) for  10000 = 4 times

E) for  100000 = 7 times

Explanation:

Given data:

load factor = 75%

initial capacity = 1000

The number of times the enlarge method will be called for a unique number of entries  would be 2 times the initial capacity ( 1000 ) because the load factor = 75% = 0.75

A) for 100 : < 1 times

b) for 750 : < 1 times

C) For 2000

= initial capacity * 2  = 2000   ( 1 time )

D) for 10000

= 1000 * 2 *2 *2*2 = 16000 ( 4 times )

to make it 10000 we have to add another 2000 which will make the number of times = 4 times

E)for  100000

= 1000*2*2*2*2*2*2*2= 128000 ( 7 times )

unique entry of 100000 is contained in 7 times

Although slow start with congestion avoidance is an effective technique for coping with congestion, it can result in long recovery times in high-speed networks, as this problem demonstrates.

A) Assume a round-trip delay of 60 msec (about what might occur across the continent) and a link with an available bandwidth of 1 Gbps and a segment size of 576 octets. Determine the window size needed to keep the pipeline full and the a worst case estimate of the time it will take to reach that window size after a timeout occurs on a new connection using Jacobson’s slow start with congestion avoidance approach.

B) Repeat part (a) for a segment size of 16 kbytes.

Answers

Answer:

The answer to this question can be defined as follows:

In option A: The answer is "13020".

In option B: The answer is "468 Segments".

Explanation:

Given:

The value of round-trip delay= 60 m-second

The value of Bandwidth= 1Gbps

The value of Segment size = 576 octets

window size =?

Formula:

[tex]\text{Window size =} \frac{(\text{Bandwidth} \times \text{round} - \text{trip time})}{(\text{segment size window })}[/tex]

                     [tex]=\frac{10^9 \times 0.06}{576 \times 8}\\\\=\frac{10^9 \times6}{576 \times 8\times 100}\\\\=\frac{10^7 \times 1}{96 \times 8}\\\\=\frac{10^7 \times 1}{768}\\\\=13020.83[/tex]

So, the value of the segments is =13020.833 or equal to 13020

Calculating segments in the size of 16 k-bytes:

[tex]\text{Window size} = \frac{10^9 \times 0.06}{16,000 \times 8}[/tex]

                    [tex]= \frac{10^9 \times 0.06}{16,000 \times 8}\\\\ = \frac{10^9 \times 6}{16,000 \times 8 \times 100}\\\\ = \frac{10^4 \times 3}{16 \times 4}\\\\ = \frac{30000}{64 }\\\\=468.75[/tex]

The size of 16 k-bytes segments is 468.75 which is equal to 468.

Explain how/where could you change the NIC Card configuration from dynamic DHCP setting to an IP address of 10.254.1.42 with a subnet mask of 255.255.0.0 and a gateway of 10.254.0.1. (hint: we spoke about 2 different methods)

Answers

Answer:

Using the terminal in linux OS to configure a static ip address, gateway and subnet mask.

Explanation:

-Enter the terminal in the linux environment and use the ifconfig eth0 or -a to bring up the main network interface and other network interfaces.

- for static network configuration, use;

  - ifconfig eth0 10.254.1.42  

  - ifconfig eth0 netmask 255.255.0.0

  - ifconfig eth0 broadcast 10.254.255.255

- and add a default gateway with;

 -  route add default gw 10.254.0.1  eth0.

- Now verify the settings with the ifconfig eth0 command.

Other Questions
ASAP PLEASE GIVE CORRECT ANSWER In a rectangular coordinate system, what is the number of units in the distance from the origin to the point $(-15, 8)$? Enter your answer help with math again please Researchers recorded that a certain bacteria population declined from 120,000 to 200 in 36 hours. At this rate of decay, how many bacteria will there be in 31 hours? Round to the nearest whole number. Advertising department expenses of $42,800 and purchasing department expenses of $32,100 of Cozy Bookstore are allocated to operating departments on the basis of dollar sales and purchase orders, respectively. Information about the allocation bases for the three operating departments follows.Department Sales Purchase OrdersBooks $ 180,000 1,170 Magazines 108,000 520 Newspapers 112,000 910 Total $ 400,000 2,600 Complete the following table by allocating the expenses of the two service departments (advertising and purchasing) to the three operating departments. (Amounts to be deducted should be indicated with minus sign.) Choose the molecule with the strongest bond. A. CH_{4} B. H_{2}O C. NH_{3} D. HF E. All are equal Describe each of the following values as (A) a discrete random variable, (B) a continuous random variable, or (C) not a random variable: 1. Exact weight of quarters now in circulation in the United States 2. Shoe sizes of humans 3. Political party affiliations of adults in the United States A. 1.C 2.A 3. B. 1.B2.A 3. C. 1.A 2.C 3. D. 1.A2. 3. find the missing part of the proportion 12/x = 3/7 x= _ Oxygen condenses into a liquid at approximately 90 K. What temperature, in degrees Fahrenheit, does this correspond to? You need to prepare 30mL solution of a 1:8 syrup solution. You have on hand 50% syrup solution and a 1:20 soda solution. How many mL of each solution do you need to create the final solution? if a man works 400km in 6 minutes.How long will he work in 9 minutes Coherent light from a sodium-vapor lamp is passed through a filter that blocks everything except for light of a single wavelength. It then falls on two slits separated by 0.490 mm . In the resulting interference pattern on a screen 2.12 m away, adjacent bright fringes are separated by 2.86 mm . For related problem-solving tips and strategies, you may want to view a Video Tutor Solution of Determining wavelength. Part A What is the wavelength of the light that falls on the slits candium forms the ion Sc3+. How many bromite ions could bond with Sc3+, and what would be the chemical formula?a.3 bromite ions, Sc(Broa)2b.2 bromite ions, Sc(BrO4)3c.3 bromite ions, Sc(Broz)d.2 bromite ions, Sc (BrO2)2 The success of the United States requires the efforts of only a few strong and knowledgeable citizens.True or false Lilianna uses \dfrac{3}{4} 4 3 start fraction, 3, divided by, 4, end fraction calories per minute just by sitting. She uses 111 more calorie per minute by walking. Lilianna uses a total of 12\dfrac{1}{4}12 4 1 12, start fraction, 1, divided by, 4, end fraction calories walking to the park. Lilianna uses the equation, d\left(\dfrac{3}{4}+1\right)=12\dfrac{1}{4}d( 4 3 +1)=12 4 1 d, left parenthesis, start fraction, 3, divided by, 4, end fraction, plus, 1, right parenthesis, equals, 12, start fraction, 1, divided by, 4, end fraction to represent the situation. What does the variable ddd represent in the equation? Choose 1 answer: Choose 1 answer: (Choice A) A Calories per minute Lilianna uses walking (Choice B) B Number of calories Lilianna would have used sitting (Choice C) C Number of minutes Lilianna walked 13.List 4 safety symbols that would be seen if you are working with a material that is biohazard, such as bacteria. If your starting salary is $40000 and you receive a 3% increase at the end of every year, what is the total amount, in dollars, you will earn one the first 16 years that you work Isreal spends the most time on social media with a total of 11.1.peru has a total of 8.3 how much more time does israel spend on social media Select the correct answer.Which personality trait best fits the description?Lupe estudia mucho y toma cursos avanzados en matemticas y literatura.A.tmidaB.amablec. estudiosaD.artstica Please answer this question now Having a skilled labor force is one of the ________________ impacts of technology on the workplace. negative positive