Write the definition of a function words_typed, that receives two parameters. The first is a person's typing speed in words per minute (an integer greater than or equal to zero). The second is a time interval in seconds (an integer greater than zero). The function returns the number of words (an integer) that a person with that typing speed would type in that time interval.

Answers

Answer 1
Answer:

   //Method definition of words_typed

   //The return type is int

   //Takes two int parameters: typingSpeed and timeInterval

   public static int words_typed(int typingSpeed, int timeInterval) {

       //Get the number of words typed by  

       //finding the product of the typing speed and the time interval

       //and then dividing the result by 60 (since the typing speed is in "words

       // per minute"  and the time interval is in "seconds")

       int numberOfWords = typingSpeed * timeInterval / 60;

       

       //return the number of words

       return numberOfWords;

       

   }        //end of method declaration

Explanation:

The code above has been written in Java and it contains comments explaining each of the lines of the code. Please go through the comments.

Answer 2

Answer:

I am writing the program in Python.

def words_typed(typing_speed,time_interval):

   typing_speed>=0

   time_interval>0

   no_of_words=int(typing_speed*(time_interval/60))

   return no_of_words

   

output=words_typed(20,30)

print(output)

Explanation:

I will explain the code line by line.

First the statement def words_typed(typing_speed,time_interval) is the definition of a function named words_typed which has two parameters typing_speed and time_interval.

typing_speed variable of integer type in words per minute.

time_interval variable of int type in seconds

The statements typing_speed>=0 and time_interval>0 means that value of typing_speed is greater than or equal to zero and value of time_interval is greater than zero as specified in the question.

The function words_typed is used to return the number of words that a  person with typing speed would type in that time interval. In order to compute the words_typed, the following formula is used:

   no_of_words=int(typing_speed*(time_interval/60))

The value of typing_speed is multiplied by value of time_interval in order to computer number of words and the result of the multiplication is stored in no_of_words. Here the time_interval is divided by 60 because the value of time_interval is in seconds while the value of typing_speed is in minutes. So to convert seconds into minutes the value of time_interval is divided by 60 because 1 minute = 60 seconds.

return no_of_words statement returns the number of words.

output=words_typed(20,30) statement calls the words_typed function and passed two values i.e 20 for typing_speed and 30 for time_interval.

print(output) statement displays the number of words a person with typing speed would type in that time interval, on the output screen.

Write The Definition Of A Function Words_typed, That Receives Two Parameters. The First Is A Person's

Related Questions

Let U = {b1, b2, , bn} with n ≥ 3. Interpret the following algorithm in the context of urn problems. for i is in {1, 2, , n} do for j is in {i + 1, i + 2, , n} do for k is in {j + 1, j + 2, ..., n} do print bi, bj, bk How many lines does it print? It prints all the possible ways to draw three balls in sequence, without replacement. It prints P(n, 3) lines. It prints all the possible ways to draw an unordered set of three balls, without replacement. It prints P(n, 3) lines. It prints all the possible ways to draw three balls in sequence, with replacement. It prints P(n, 3) lines. It prints all the possible ways to draw an unordered set of three balls, without replacement. It prints C(n, 3) lines. It prints all the possible ways to draw three balls in sequence, with replacement. It prints C(n, 3) lines.

Answers

Answer:

Check the explanation

Explanation:

Kindly check the attached image for the first step

Note that the -print" statement executes n(n — I)(n — 2) times and the index values for i, j, and k can never be the same.  

Therefore, the algorithm prints out all the possible ways to draw three balls in sequence, without replacement.

Now we need to determine the number of lines this the algorithm print. In this case, we are selecting three different balls randomly from a set of n balls. So, this involves permutation.  

Therefore, the algorithm prints the total  

P(n, 3)  

lines.  

How can u refer to additional information while giving a presentation

Answers

Answer:

There are various ways: Handing out papers/fliers to people, or presenting slides.

For this problem, you will write a function standard_deviation that takes a list whose elements are numbers (they may be floats or ints), and returns their standard deviation, a single number. You may call the variance method defined above (which makes this problem easy), and you may use sqrt from the math library, which we have already imported for you. Passing an empty list to standard_deviation should result in a ZeroDivisionError exception being raised, although you should not have to explicitly raise it yourself.

Answers

Answer:

import math   def standard_deviation(aList):    sum = 0    for x in aList:        sum += x          mean = sum / float(len(aList))    sumDe = 0    for x in aList:        sumDe += (x - mean) * (x - mean)        variance = sumDe / float(len(aList))    SD = math.sqrt(variance)    return SD   print(standard_deviation([3,6, 7, 9, 12, 17]))

Explanation:

The solution code is written in Python 3.

Firstly, we need to import math module (Line 1).

Next, create a function standard_deviation that takes one input parameter, which is a list (Line 3). In the function, calculate the mean for the value in the input list (Line 4-8). Next, use the mean to calculate the variance (Line 10-15). Next, use sqrt method from math module to get the square root of variance and this will result in standard deviation (Line 16). At last, return the standard deviation (Line 18).

We can test the function using a sample list (Line 20) and we shall get 4.509249752822894

If we pass an empty list, a ZeroDivisionError exception will be raised.

You work at a cheeseburger restaurant. Write a program that determines appropriate changes to a food order based on the user’s dietary restrictions. Prompt the user for their dietary restrictions: vegetarian, lactose intolerant, or none. Then using if statements and else statements, print the cook a message describing how they should modify the order. The following messages should be used: - If the user enters "lactose intolerant", say "No cheese." - If the user enters "vegetarian", say "Veggie burger." - If the user enters "none", say "No alterations."

Answers

Answer:

See explaination

Explanation:

dietary_restrictions = input("Any dietary restrictions?: ")

if dietary_restrictions=="lactose intolerant":

print("No cheese")

elif dietary_restrictions == "vegetarian":

print("Veggie burger")

else:

print("No alteration")

Computer A has an overall CPI of 1.3 and can be run at a clock rate of 600 MHz. Computer B has a CPI of 2.5 and can be run at a clock rate of 750 MHz. We have a particular program we wish to run. When compiled for computer A, this program has exactly 100,000 instructions. How many instructions would the program need to have when compiled for Computer B, in order for the two computers to have exactly the same execution time for this program

Answers

Answer:

Check the explanation

Explanation:

CPI means Clock cycle per Instruction

given Clock rate 600 MHz then clock time is Cー 1.67nSec clockrate 600M

Execution time is given by following Formula.

Execution Time(CPU time) = CPI*Instruction Count * clock time = [tex]\frac{CPI*Instruction Count}{ClockRate}[/tex]

a)

for system A CPU time is 1.3 * 100, 000 600 106

= 216.67 micro sec.

b)

for system B CPU time is [tex]=\frac{2.5*100,000}{750*10^6}[/tex]

= 333.33 micro sec

c) Since the system B is slower than system A, So the system A executes the given program in less time

Hence take CPU execution time of system B as CPU time of System A.

therefore

216.67 micro = =[tex]\frac{2.5*Instruction}{750*10^6}[/tex]

Instructions = 216.67*750/2.5

= 65001

hence 65001 instruction are needed for executing program By system B. to complete the program as fast as system A

The number of instructions that the program would need to have when compiled for Computer B is; 65000 instructions

What is the execution time?

Formula for Execution time is;

Execution time = (CPI × Instruction Count)/Clock Time

We are given;

CPI for computer A = 1.3

Instruction Count = 100000

Clock time = 600 MHz = 600 × 10⁶ Hz

Thus;

Execution time = (1.3 * 100000)/(600 × 10⁶)

Execution time(CPU Time) = 216.67 * 10⁻⁶ second

For CPU B;

CPU Time = (2.5 * 100000)/(750 × 10⁶)

CPU Time = 333.33 * 10⁻⁶ seconds

Thus, instructions for computer B for the two computers to have same execution time is;

216.67 * 10⁻⁶ = (2.5 * I)/(750 × 10⁶)

I = (216.67 * 10⁻⁶ * 750 × 10⁶)/2.5

I = 65000 instructions

Read more about programming instructions at; https://brainly.com/question/15683939

Help its simple but I don't know the answer!!!

If you have a -Apple store and itunes gift card-

can you use it for in app/game purchases?

Answers

Answer:

yes you can do that it's utter logic

Answer:

Yes.

Explanation:

Itunes gift cards do buy you games/movies/In app purchases/ect.

Write a functionvector merge(vector a, vector b)that merges two vectors, alternating elements from both vectors. If one vector isshorter than the other, then alternate as long as you can and then append the remaining elements from the longer vector. For example, if a is 1 4 9 16and b is9 7 4 9 11then merge returns the vector1 9 4 7 9 4 16 9 1118. Write a predicate function bool same_elements(vector a, vector b)that checks whether two vectors have the same elements in some order, with the same multiplicities. For example, 1 4 9 16 9 7 4 9 11 and 11 1 4 9 16 9 7 4 9 would be considered identical, but1 4 9 16 9 7 4 9 11 and 11 11 7 9 16 4 1 would not. You will probably need one or more helper functions.19. What is the difference between the size and capacity of a vector

Answers

Answer:

see explaination for code

Explanation:

CODE

#include <iostream>

#include <vector>

using namespace std;

vector<int> merge(vector<int> a, vector<int> b) {

vector<int> result;

int k = 0;

int i = 0, j = 0;

while (i < a.size() && j < b.size()) {

if (k % 2 == 0) {

result.push_back(a[i ++]);

} else {

result.push_back(b[j ++]);

}

k ++;

}

while (i < a.size()) {

result.push_back(a[i ++]);

}

while(j < b.size()) {

result.push_back(b[j ++]);

}

return result;

}

int main() {

vector<int> a{1, 4, 9, 16};

vector<int> b{9, 7, 4, 9, 11};

vector<int> result = merge(a, b);

for (int i=0; i<result.size(); i++) {

cout << result[i] << " ";

}

}


(a) What is the difference between a compare validator and a range validator?

(b) When would you choose to use one versus the other?

Answers

Answer:

Check the explanation

Explanation:

a) A compare validator: A compare validator can be described as a particular method that is utilized to control and also enabled to perform different types of validation tasks. It is being used to carry out as well as to execute a correct data type that determines the entered value is proper value into a form field or not. For instance when in an application registration it makes use of the confirm password after the first-password.

(b) Whenever it is compulsory to determine if the value that has been entered is the correct value into the form field then the usage of compare validator will be needed whereas a range validator is used to confirm the entered value is in a specific range.

Explanation:

a) A compare validator: A compare validator can be described as a particular method that is utilized to control and also enabled to perform different types of validation tasks. It is being used to carry out as well as to execute a correct data type that determines the entered value is proper value into a form field or not. For instance when in an application registration it makes use of the confirm password after the first-password.

(b) Whenever it is compulsory to determine if the value that has been entered is the correct value into the form field then the usage of compare validator will be needed whereas a range validator is used to confirm the entered value is in a specific range.

Algorithmic Complexity: what is the asymptotic complexity (Big-O) of each code section? Identify the critical section of each.\ Line 1: for (int i=0; i<532; i++) { f(n) = O( ) Line 2: for (int j=1; j

Answers

Answer:

Check the explanation

Explanation:

1) f(n) = O( 1 ), since the loops runs a constant number of times independent of any input size

there is no critical section in the code, as a critical section is some part of code which is shared by multiple threads or even processes to modify any shared variable.This code does not contain any variable which can be shared.

2) f(n) = O( log n! ), the outer loop runs for n times, and the inner loop runs log k times when i = k,ie the total number of print will be – log 1 + log2 +log3 +log4+…...+ log n = log (1 . 2 . 3 . 4 . ……. . n ) =log n!

there is no critical section in the code, as a critical section is some part of code which is shared by multiple threads or even processes to modify any shared variable.This code does not contain any variable which can be shared.

Note : Log (m *n) = Log m + Log n : this is property of logarithm

3) f(n) = [tex]O( n^2 )[/tex], since both outer and inner loop runs n times hence , the total iterations of print statement will be : n +n+n+…+n

for n times, this makes the complexity – n * n = n2

there is no critical section in the code, as a critical section is some part of code which is shared by multiple threads or even processes to modify any shared variable.This code does not contain any variable which can be shared.

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string.

Ex: If the input is:

n Monday
the output is:

1
Ex: If the input is:

z Today is Monday
the output is:

0
Ex: If the input is:

n It's a sunny day
the output is:

2
Case matters.

Ex: If the input is:

n Nobody
the output is:

0
n is different than N.





This is what i have so far.
#include
#include
using namespace std;

int main() {

char userInput;
string userStr;
int numCount;

cin >> userInput;
cin >> userStr;

while (numCount == 0) {
cout << numCount << endl;
numCount = userStr.find(userInput);

}
return 0;
}


Answers

Here is a Python program:

tmp = input().split(' ')
c = tmp[0]; s = tmp[1]
ans=0
for i in range(len(s)):
if s[i] == c: ans+=1

# the ans variable stores the number of occurrences
print(ans)

Explain possible ways that Darla can communicate with her coworker Terry, or her manager to make sure Joe receives great customer service?

Answers

Answer:

They can communicate over the phone or have meetings describing what is and isn't working for Joe. It's also very important that Darla makes eye contact and is actively listening to effectively handle their customer.

Explanation:

Create a macro named mReadInt that reads a 16- or 32-bit signed integer from standard input and returns the value in an argument. Use conditional operators to allow the macro to adapt to the size of the desired result. Write a program that tests the macro, passing it operands of various sizes.

Answers

Answer:

;Macro mReadInt definition, which take two parameters

;one is the variable to save the number and other is the length

;of the number to read (2 for 16 bit and 4 for 32 bit) .

%macro mReadInt 2

mov eax,%2

cmp eax, "4"

je read2

cmp eax, "2"

je read1

read1:

mReadInt16 %1

cmp eax, "2"

je exitm

read2:

mReadInt32 %1

exitm:

xor eax, eax

%endmacro

;macro to read the 16 bit number, parameter is number variable

%macro mReadInt16 1

mov eax, 3

mov ebx, 2

mov ecx, %1

mov edx, 5

int 80h

%endmacro

;macro to read the 32 bit number, parameter is number variable

%macro mReadInt32 1

mov eax, 3

mov ebx, 2

mov ecx, %1

mov edx, 5

int 80h

%endmacro

;program to test the macro.

;data section, defining the user messages and lenths

section .data

userMsg db 'Please enter the 32 bit number: '

lenUserMsg equ $-userMsg

userMsg1 db 'Please enter the 16 bit number: '

lenUserMsg1 equ $-userMsg1

dispMsg db 'You have entered: '

lenDispMsg equ $-dispMsg

;.bss section to declare variables

section .bss

;num to read 32 bit number and num1 to rad 16-bit number

num resb 5

num1 resb 3

;.text section

section .text

;program start instruction

global _start

_start:

;Displaying the message to enter 32bit number

mov eax, 4

mov ebx, 1

mov ecx, userMsg

mov edx, lenUserMsg

int 80h

;calling the micro to read the number

mReadInt num, 4

;Printing the display message

mov eax, 4

mov ebx, 1

mov ecx, dispMsg

mov edx, lenDispMsg

int 80h

;Printing the 32-bit number

mov eax, 4

mov ebx, 1

mov ecx, num

mov edx, 4

int 80h

;displaying message to enter the 16 bit number

mov eax, 4

mov ebx, 1

mov ecx, userMsg1

mov edx, lenUserMsg1

int 80h

;macro call to read 16 bit number and to assign that number to num1

;mReadInt num1,2

;calling the display mesage function

mov eax, 4

mov ebx, 1

mov ecx, dispMsg

mov edx, lenDispMsg

int 80h

;Displaying the 16-bit number

mov eax, 4

mov ebx, 1

mov ecx, num1

mov edx, 2

int 80h

;exit from the loop

mov eax, 1

mov ebx, 0

int 80h

Explanation:

For an assembly code/language that has the conditions given in the question, the program that tests the macro, passing it operands of various sizes is given below;

;Macro mReadInt definition, which take two parameters

;one is the variable to save the number and other is the length

;of the number to read (2 for 16 bit and 4 for 32 bit) .

%macro mReadInt 2

mov eax,%2

cmp eax, "4"

je read2

cmp eax, "2"

je read1

read1:

mReadInt16 %1

cmp eax, "2"

je exitm

read2:

mReadInt32 %1

exitm:

xor eax, eax

%endmacro

;macro to read the 16 bit number, parameter is number variable

%macro mReadInt16 1

mov eax, 3

mov ebx, 2

mov ecx, %1

mov edx, 5

int 80h

%endmacro

;macro to read the 32 bit number, parameter is number variable

%macro mReadInt32 1

mov eax, 3

mov ebx, 2

mov ecx, %1

mov edx, 5

int 80h

%endmacro

;program to test the macro.

;data section, defining the user messages and lenths

section .data

userMsg db 'Please enter the 32 bit number: '

lenUserMsg equ $-userMsg

userMsg1 db 'Please enter the 16 bit number: '

lenUserMsg1 equ $-userMsg1

dispMsg db 'You have entered: '

lenDispMsg equ $-dispMsg

;.bss section to declare variables

section .bss

;num to read 32 bit number and num1 to rad 16-bit number

num resb 5

num1 resb 3

;.text section

section .text

;program start instruction

global _start

_start:

;Displaying the message to enter 32bit number

mov eax, 4

mov ebx, 1

mov ecx, userMsg

mov edx, lenUserMsg

int 80h

;calling the micro to read the number

mReadInt num, 4

;Printing the display message

mov eax, 4

mov ebx, 1

mov ecx, dispMsg

mov edx, lenDispMsg

int 80h

;Printing the 32-bit number

mov eax, 4

mov ebx, 1

mov ecx, num

mov edx, 4

int 80h

;displaying message to enter the 16 bit number

mov eax, 4

mov ebx, 1

mov ecx, userMsg1

mov edx, lenUserMsg1

int 80h

;macro call to read 16 bit number and to assign that number to num1

;mReadInt num1,2

;calling the display mesage function

mov eax, 4

mov ebx, 1

mov ecx, dispMsg

mov edx, lenDispMsg

int 80h

;Displaying the 16-bit number

mov eax, 4

mov ebx, 1

mov ecx, num1

mov edx, 2

int 80h

;exit from the loop

mov eax, 1

mov ebx, 0

int 80h

Trace the complete execution of the MergeSort algorithm when called on the array of integers, numbers, below. Show the resulting sub-arrays formed after each call to merge by enclosing them in { }. For example, if you originally had an array of 5 elements, a = {5,2,8,3,7}, the first call to merge would result with: {2, 5} 8, 3, 7 ← Note after the first call to merge, two arrays of size 1 have been merged into the sorted subarray {2,5} and the values 2 and 5 are sorted in array a You are to do this trace for the array, numbers, below. Be sure to show the resulting sub-arrays after each call to MergeSort. int[] numbers = {23, 14, 3, 56, 17, 8, 42, 18, 5};

Answers

Answer:

public class Main {

public static void merge(int[] arr, int l, int m, int r) {

int n1 = m - l + 1;

int n2 = r - m;

int[] L = new int[n1];

int[] R = new int[n2];

for (int i = 0; i < n1; ++i)

L[i] = arr[l + i];

for (int j = 0; j < n2; ++j)

R[j] = arr[m + 1 + j];

int i = 0, j = 0;

int k = l;

while (i < n1 && j < n2) {

if (L[i] <= R[j]) {

arr[k] = L[i];

i++;

} else {

arr[k] = R[j];

j++;

}

k++;

}

while (i < n1) {

arr[k] = L[i];

i++;

k++;

}

while (j < n2) {

arr[k] = R[j];

j++;

k++;

}

printArray(arr, l, r);

}

public static void sort(int[] arr, int l, int r) {

if (l < r) {

int m = (l + r) / 2;

sort(arr, l, m);

sort(arr, m + 1, r);

merge(arr, l, m, r);

}

}

static void printArray(int[] arr, int l, int r) {

System.out.print("{");

for (int i = l; i <= r; ++i)

System.out.print(arr[i] + " ");

System.out.println("}");

}

public static void main(String[] args) {

int[] arr = {23, 14, 3, 56, 17, 8, 42, 18, 5};

sort(arr, 0, arr.length - 1);

}

}

Explanation:

See answer

Write a program that maintains a database containing data, such as name and birthday, about your friends and relatives. You should be able to enter, remove, modify, or search this data. Initially, you can assume that the names are unique. The program should be able to save the data in a fi le for use later. Design a class to represent the database and another class to represent the people. Use a binary search tree of people as a data member of the database class. You can enhance this problem by adding an operation that lists everyone who satisfi es a given criterion. For example, you could list people born in a given month. You should also be able to list everyone in the database.

Answers

Answer:

[tex]5909? \times \frac{?}{?} 10100010 {?}^{?} 00010.222 {?}^{2} [/tex]

Which of the following should be the first page of a report?
O Title page
Introduction
O Table of contents
Terms of reference

Answers

Answer:

Title page should be the first page of a report.

hope it helps!

the smallest unit of time in music called?

Answers

Answer:

Ready to help ☺️

Explanation:

A tatum is a feature of music that has been defined as the smallest time interval between notes in a rhythmic phrase.

Answer:

A tatum bc is a feature of music that has been variously defined as the smallest time interval between successive notes in a rhythmic phrase "the shortest durational value

Zoom Vacuum, a family-owned manufacturer of high-end vacuums, has grown exponentially over the last few years. However, the company is having difficulty preparing for future growth. The only information system used at Zoom is an antiquated accounting system. The company has one manufacturing plant located in Iowa; and three warehouses, in Iowa, New Jersey, and Nevada. The Zoom sales force is national, and Zoom purchases about 25 percent of its vacuum parts and materials from a single overseas supplier. You have been hired to recommend the information systems Zoom should implement in order to maintain their competitive edge. However, there is not enough money for a full-blown, cross-functional enterprise application, and you will need to limit the first step to a single functional area or constituency. What will you choose, and why?

Answers

Answer:A TPS focusing on production and manufacturing to keep production costs low while maintaining quality, and for communicating with other possible vendors. The TPS would later be used to feed MIS and other higher level systems.

Explanation:

Design an application for Bob's E-Z Loans. The application accepts a client's loan amount and monthly payment amount. Output the customer's loan balance each month until the loan is paid off. b. Modify the Bob's E-Z Loans application so that after the payment is made each month, a finance charge of 1 percent is added to the balance.

Answers

Answer:

part (a).

The program in cpp is given below.

#include <stdio.h>

#include <iostream>

using namespace std;

int main()

{

   //variables to hold balance and monthly payment amounts

   double balance;

   double payment;

   //user enters balance and monthly payment amounts

   std::cout << "Welcome to Bob's E-Z Loans application!" << std::endl;

   std::cout << "Enter the balance amount: ";

   cin>>balance;

   std::cout << "Enter the monthly payment: ";

   cin>>payment;

   std::cout << "Loan balance: " <<" "<< "Monthly payment: "<< std::endl;

   //balance amount and monthly payment computed

   while(balance>0)

   {

       if(balance<payment)    

         { payment = balance;}

       else

       {  

           std::cout << balance <<"\t\t\t"<< payment << std::endl;

           balance = balance - payment;

       }

   }

   return 0;

}

part (b).

The modified program from part (a), is given below.

#include <stdio.h>

#include <iostream>

using namespace std;

int main()

{

   //variables to hold balance and monthly payment amounts

   double balance;

   double payment;

   double charge=0.01;

   //user enters balance and monthly payment amounts

   std::cout << "Welcome to Bob's E-Z Loans application!" << std::endl;

   std::cout << "Enter the balance amount: ";

   cin>>balance;

   std::cout << "Enter the monthly payment: ";

   cin>>payment;

   balance = balance +( balance*charge );

   std::cout << "Loan balance with 1% finance charge: " <<" "<< "Monthly payment: "<< std::endl;

   //balance amount and monthly payment computed

   while(balance>payment)

   {

           std::cout << balance <<"\t\t\t\t\t"<< payment << std::endl;

           balance = balance +( balance*charge );

           balance = balance - payment;

       }

   if(balance<payment)    

         { payment = balance;}          

   std::cout << balance <<"\t\t\t\t\t"<< payment << std::endl;

   return 0;

}

Explanation:

1. The variables to hold the loan balance and the monthly payment are declared as double.

2. The program asks the user to enter the loan balance and monthly payment respectively which are stored in the declared variables.  

3. Inside a while loop, the loan balance and monthly payment for each month is computed with and without finance charges in part (a) and part (b) respectively.

4. The computed values are displayed for each month till the loan balance becomes zero.

5. The output for both part (a) and part (b) are attached as images.

The relationship between the temperature of a fluid (t, in seconds), temperature (T, in degrees Celsius), is dependent upon the initial temperature of the liquid (T0, in degrees Celsius), the ambient temperature of the surroundings (TA, in degrees Celsius) and the cooling constant (k, in hertz); the relationship is given by: ???? ???? ???????? ???? ???????????? ???? ???????????? ???????????????? Ask the user the following questions:  From a menu, choose fluid ABC, FGH, or MNO.  Enter the initial fluid temperature, in units of degrees Celsius.  Enter the time, in units of minutes.  Enter the ambient air temperature, in units of degrees Celsius. Enter the following data into the program. The vector contains the cooling constant (k, units of hertz) corresponding to the menu entries. K Values = [0.01, 0.03, 0.02] Create a formatted output statement for the user in the Command Window similar to the following. The decimal places must match. ABC has temp 83.2 degrees Celsius after 3 minutes. In

Answers

Answer:

See explaination

Explanation:

clc;

clear all;

close all;

x=input(' choose abc or fgh or mno:','s');

to=input('enter intial fluid temperature in celcius:');

t1=input('enter time in minutes:');

ta=input('enter ambient temperature in celcius:');

abc=1;

fgh=2;

mno=3;

if x==1

k=0.01;

elseif x==2

k=0.03;

else

k=0.02;

end

t=ta+((to-ta)*exp((-k)*t1));

X = sprintf('%s has temp %f degrees celcius after %d minutes.',x,t,t1);

disp(X);

Donnell backed up the information on his computer every week on a flash drive. Before copying the files to the flash drive, he always ran a virus scan against the files to ensure that no viruses were being copied to the flash drive. He bought a new computer and inserted the flash drive so that he could transfer his files onto the new computer. He got a message on the new computer that the flash drive was corrupted and unreadable; the information on the flash drive cannot be retrieved. Assuming that the flash drive is not carrying a virus, which of the following does this situation reflect?
a. Compromise of the security of the information on the flash drive
b. Risk of a potential breach in the integrity of the data on the flash drive
c. Both of the above
d. Neither of the above.

Answers

Answer:

b. Risk of a potential breach in the integrity of the data on the flash drive

Explanation:

The corrupted or unreadable file error is an error message generated if you are unable to access the external hard drive connected to the system through the USB port. This error indicates that the files on the external hard drive are no longer accessible and cannot be opened.

There are several reasons that this error message can appear:

Viruses and Malware affecting the external hard drive .Physical damage to external hard drive or USB memory .Improper ejection of removable drives.

In this question, we give two implementations for the function: def intersection_list(lst1, lst2) This function is given two lists of integers lst1 and lst2. When called, it will create and return a list containing all the elements that appear in both lists. For example, the call: intersection_list([3, 9, 2, 7, 1], [4, 1, 8, 2])could create and return the list [2, 1]. Note: You may assume that each list does not contain duplicate items. a) Give an implementation for intersection_list with the best worst-case runtime. b) Give an implementation for intersection_list with the best average-case runtime.

Answers

Answer:

see explaination

Explanation:

a)Worst Case-time complexity=O(n)

def intersection_list(lst1, lst2):

lst3 = [value for value in lst1 if value in lst2]

return lst3

lst1 = []

lst2 = []

n1 = int(input("Enter number of elements for list1 : "))

for i in range(0, n1):

ele = int(input())

lst1.append(ele) # adding the element

n2 = int(input("Enter number of elements for list2 : "))

for i in range(0, n2):

ele = int(input())

lst2.append(ele) # adding the element

print(intersection_list(lst1, lst2))

b)Average case-time complexity=O(min(len(lst1), len(lst2))

def intersection_list(lst1, lst2):

return list(set(lst1) & set(lst2))

lst1 = []

lst2 = []

n1 = int(input("Enter number of elements for list1 : "))

for i in range(0, n1):

ele = int(input())

lst1.append(ele)

n2 = int(input("Enter number of elements for list2 : "))

for i in range(0, n2):

ele = int(input())

lst2.append(ele)

print(intersection_list(lst1, lst2))

Describe how DMA is
used to
transfer data
from peripherals.

Answers

Answer:

Think of DMA as a co-processor that is used to quickly transfer data between main memory and peripherals without the intervention of the CPU.

Implement the function get_stats The function get_stats calculates statistics on a sample of values. It does the following: its input parameter is a csv string a csv (comma separated values) string contains a list of numbers (the sample) return a tuple that has 3 values: (n, stdev, mean) tuple[0] is the number of items in the sample tuple[1] is the standard deviation of the sample tuple[2] is the mean of the sample

Answers

Answer:

Check the explanation

Explanation:

PYTHON CODE: (lesson.py)

import statistics

# function to find standard deviation, mean

def get_stats(csv_string):

   # calling the function to clean the data

   sample=clean(csv_string)

   # finding deviation, mean

   std_dev=statistics.stdev(sample)

   mean=statistics.mean(sample)

   # counting the element in sample

   count=len(sample)

   # return the results in a tuple

   return (count, std_dev, mean)

# function to clean the csv string

def clean(csv_string):

   # temporary list

   t=[]

   # splitting the string by comma

   data=csv_string.split(',')

 

   # looping item in data list

   for item in data:

       # removing space,single quote, double quote

       item=item.strip()

       item= item.replace("'",'')

       item= item.replace('"','')

       # if the item is valid      

       if item:

           # converting into float

           try:

             

               t.append(float(item))

           except:

               continue

   # returning the list of float

   return t

if __name__=='__main__':

   csv = "a, 1, '-2', 2.35, None,, 4, True"

   print(clean(csv))

   print(get_stats('1.0,2.0,3.0'))

Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
import java.util.Scanner; public class RecursiveCalls { public static void backwardsAlphabet(char currLetter) { if (currLetter == 'a') { System.out.println(currLetter); } else { System.out.print(currLetter + " "); backwardsAlphabet((char)(currLetter - 1)); } } public static void main (String [] args) { Scanner scnr = new Scanner(System.in); char startingLetter; startingLetter = scnr.next().charAt(0); /* Your solution goes here */ } }

Answers

Answer:

Following are the code to method calling

backwardsAlphabet(startingLetter); //calling method backwardsAlphabet

Output:

please find the attachment.

Explanation:

Working of program:

In the given java code, a class "RecursiveCalls" is declared, inside the class, a method that is "backwardsAlphabet" is defined, this method accepts a char parameter that is "currLetter". In this method a conditional statement is used, if the block it will check input parameter value is 'a', then it will print value, otherwise, it will go to else section in this block it will use the recursive function that prints it's before value. In the main method, first, we create the scanner class object then defined a char variable "startingLetter", in this we input from the user and pass its value into the method that is "backwardsAlphabet".

Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per line. The coin types are dollars, quarters, dimes, nickels, and pennies. Use singular and plural coin names as appropriate, like 1 penny vs. 2 pennies. Ex: If the input is: 0 or less, the output is: no change Ex: If the input is: 45 the output is: 1 quarter 2 dimes

Answers

Answer:.

// Program is written in C++.

// Comments are used for explanatory purposes

// Program starts here..

#include<iostream>

using namespace std;

int main()

{

// Declare Variables

int amount, dollar, quarter, dime, nickel, penny;

// Prompt user for input

cout<<"Amount: ";

cin>>amount;

// Check if input is less than 1

if(amount<=0)

{

cout<<"No Change";

}

else

{

// Convert amount to various coins

dollar = amount/100;

amount = amount%100;

quarter = amount/25;

amount = amount%25;

dime = amount/10;

amount = amount%10;

nickel = amount/5;

penny = amount%5;

// Print results

if(dollar>=1)

{

if(dollar == 1)

{

cout<<dollar<<" dollar\n";

}

else

{

cout<<dollar<<" dollars\n";

}

}

if(quarter>=1)

{

if(quarter== 1)

{

cout<<quarter<<" quarter\n";

}

else

{

cout<<quarter<<" quarters\n";

}

}

if(dime>=1)

{

if(dime == 1)

{

cout<<dime<<" dime\n";

}

else

{

cout<<dime<<" dimes\n";

}

}

if(nickel>=1)

{

if(nickel == 1)

{

cout<<nickel<<" nickel\n";

}

else

{

cout<<nickel<<" nickels\n";

}

}

if(penny>=1)

{

if(penny == 1)

{

cout<<penny<<" penny\n";

}

else

{

cout<<penny<<" pennies\n";

}

}

}

return 0;

}

Retail price data for n = 60 hard disk drives were recently reported in a computer magazine. Three variables were recorded for each hard disk drive: y = Retail PRICE (measured in dollars) x1 = Microprocessor SPEED (measured in megahertz) (Values in sample range from 10 to 40) x2 = CHIP size (measured in computer processing units) (Values in sample range from 286 to 486) A first-order regression model was fit to the data. Part of the printout follows: __________.

Answers

Answer:

Explanation:

Base on the scenario been described in the question, We are 95% confident that the price of a single hard drive with 33 megahertz speed and 386 CPU falls between $3,943 and $4,987

The Monte Carlo (MC) Method (Monte Carlo Simulation) was first published in 1949 by Nicholas Metropolis and Stanislaw Ulam in the work "The Monte Carlo Method" in the Journal of American Statistics Association. The name Monte Carlo has its origins in the fact that Ulam had an uncle who regularly gambled at the Monte Carlo casino in Monaco. In fact, way before 1949 the method had already been extensively used as a secret project of the U.S. Defense Department during the so-called "Manhattan Project". The basic principle of the Monte Carlo Method is to implement on a computer the Strong Law of Large Numbers (SLLN) (see also Lecture 9). The Monte Carlo Method is also typically used as a probabilistic method to numerically compute an approximation of a quantity that is very hard or even impossible to compute exactly like, e.g., integrals (in particular, integrals in very high dimensions!). The goal of Problem 2 is to write a Python code to estimate the irrational number

Answers

Answer:

can you give more detail

Explanation:

A cloud provider is deploying a new SaaS product comprised of a cloud service. As part of the deployment, the cloud provider wants to publish a service level agreement (SLA) that provides an availability rating based on its estimated availability over the next 12 months. First, the cloud provider estimates that, based on historical data of the cloud environment, there is a 25% chance that the physical server hosting the cloud service will crash and that such a crash would take 2 days before the cloud service could be restored. It is further estimated that, over the course of a 12 month period, there will be various attacks on the cloud service, resulting in a total of 24 hours of downtime. Based on these estimates, what is the availability rating of the cloud service that should be published in the SLA?

Answers

Answer:

99.6

Explanation:

The cloud provider  provides the certain modules of the cloud service like infrastructure as a service , software as a service ,etc to other companies .The cloud provider implements a new SaaS service that includes a cloud platform also the cloud provider intends to disclose the Service Level Agreement that is score based on its approximate accessibility during the next 12 months.

The Cloud providers predict that, depending on past cloud system data, it is a 25 % risk that a physical server holding the cloud platform will fail therefore such a failure will require 2 days to recover the cloud service so 99.6 is the Cloud storage accessibility ranking, to be released in the SLA.

#define DIRECTN 100
#define INDIRECT1 20
#define INDIRECT2 5
#define PTRBLOCKS 200

typedef struct {
filename[MAXFILELEN];
attributesType attributes; // file attributes
uint32 reference_count; // Number of hard links
uint64 size; // size of file
uint64 direct[DIRECTN]; // direct data blocks
uint64 indirect[INDIRECT1]; // single indirect blocks
uint64 indirect2[INDIRECT2]; // double indirect

} InodeType;

Single and double indirect inodes have the following structure:

typedef struct
{
uint64 block_ptr[PTRBLOCKS];
}
IndirectNodeType;

Required:
Assuming a block size of 0x1000 bytes, write pseudocode to return the block number associated with an offset of N bytes into the file.

Answers

Answer:

WOW! that does not look easy!

Explanation:

I wish i could help but i have no idea how to do that lol

6. Why did he choose to install the window not totally plumb?

Answers

Answer:

Because then it would break

Explanation:

You achieve this by obtaining correct measurements. When measuring a window, plumb refers to the vertical planes, and level refers to the horizontal planes. So he did not install the window totally plumb

Other Questions
how did buddhism spread to china? When talking to others about their feelings, it's important to:ALet them know you are listening by making regular eye contactBAsk them how you can helpC Encourage them to talk to a trusted adult if they need extra supportD All of the above What made the televised operations of Desert Storm distinct from the war footage that had emerged from Vietnam?Choose 1 answer:Choose 1 answer:(Choice A)ADesert Storm was the first American conflict to be broadcast on live television.(Choice B)BThere was no difference in the amount or quality of the footage, but Americans paid much more attention to the Vietnam War than they did to Desert Storm.(Choice C)CThere was considerably more public protest for Desert Storm thanks to its broad media coverage. Which of the following presents a safety hazard while working in the science laboratory?A knowing how to use equipmentB wearing safety gogglesC following directionsD working alone 2x - x-6=0 resuelve What was Adolf Hitler's "Final Solution" and what steps did he take to implement it? You MUST use complete sentences in your answer. * Reduce the following mixed number 2 2/8 Why are the men in the 442nd infantry regiment famous Construct a histogram to display for each given data set. The data for the circumferences of the pumpkins in the Jeffiers' family pumpkin crop are 22.1, 35.6, 15.8, 36.9, 40.0, 28.5, 38.4, 20.4, 25.8, 34.1, 39.9, 42.2, 24.3, 22.7, 19.8, 27.9, 22.2, 34.3, 40.4, 20.6, 38.2, and 18.1. Use 10 sx < 20 as the first interval. Find the surface area of a right cone that has a diameter of 11.2 feet and a height of 9.2 feet. Round your answer to the nearest hundredth. Which of the following statements best explains the connection between the social status of women and a country's overallhealth?A. Women who enjoy a higher social status are usually less educated than women of a lower social status.B. Women who enjoy a higher social status are usually more educated than women of a lower socialstatus.C. Women who enjoy a higher social status are likely to have far more children than women of a lowersocial status.D. Women who enjoy a higher social status are less likely to have healthcare resources than women of alower social status. What is the mean and median of 25,50,58,54,55 Find "C" when "F" = 120.Round to tenths. C= 5F-160 /9 1. A ball is thrown off of a balcony and it's height can bemodeled using the function, f(x) = -x2 + 4x + 12, where x isthe number of second after the ball was released. Afterhow many seconds will it the ball to hit the ground? Michael Jordan lleva una talla _________. pequea mediana vieja grande The political power of the wealthy, elite Proprietors was decreased. Backcountry settlements were opened and many Scotch-Irish and German settlers caused the population to grow on thefrontier The English government began to import naval stores from South Carolina and allowed merchants to sell rice directly toother countries. Tensions between the Lowcountry and Backcountry increased over the issue of representationThis list of notes would be MOST useful to a student writing a research paper titledA)"South Carolina's Transition from Proprietary Rule to a Royal Colony."B)"South Carolina's Transition from a Royal Colony to Proprietary Rule."C)"Reasons for the Division of the Colony into North and South Carolina."D)"Factors Leading to the Rise of the Regulator Movement in South Carolina." The altitude of an airplane is decreasing at a rate of 44 feet per second. What is the change in altitude of the airplane over a period of 34 seconds? a summary is a story retold in a form AB=Round your answer to the nearest hundredth.pleaseee On April 1, 2017, Pharoah Company issued $990,000 of 12%, 10-year bonds dated January 1 at par plus accrued interest. Interest is payable semiannually on July 1 and January 1. Prepare journal entries to record the following. (Credit account titles are automatically indented when the amount is entered. Do not indent manually. If no entry is required, select "No Entry" for the account titles and enter 0 for the amounts. Record journal entries in the order presented in the problem.) (a) The issuance of the bonds. (b) The payment of interest on July 1. (c) The accrual of interest on December 31.