Zoom Vacuum, a family-owned manufacturer of high-end vacuums, has grown exponentially over the last few years. However, the company is having difficulty preparing for future growth. The only information system used at Zoom is an antiquated accounting system. The company has one manufacturing plant located in Iowa; and three warehouses, in Iowa, New Jersey, and Nevada. The Zoom sales force is national, and Zoom purchases about 25 percent of its vacuum parts and materials from a single overseas supplier. You have been hired to recommend the information systems Zoom should implement in order to maintain their competitive edge. However, there is not enough money for a full-blown, cross-functional enterprise application, and you will need to limit the first step to a single functional area or constituency. What will you choose, and why?

Answers

Answer 1

Answer:

The best advice for Zoom Vacuum is  to start with a Transaction Processing System(TPS). This system will process all the day to day transactions of the system. It is like a real time system where users engage with the TPS and generate, retrieve and update the data. it would be very helpful in lowering the cost of production and at the same time manufacture and produce standard quality products.

Although, TPS alone would not be sufficient enough. so Management Information System(MIS) would be needed, that can get the data from the TPS and process it to get vital information.

This MIS will bring about information regarding the sales and inventory data about the current and well as previous years.

With the combination of TPS as well as MIS is a minimum requirement for a Zoom Vacuum to become successful in the market.

Explanation:

Solution

When we look at the description of the Zoom Vacuum manufacturing company closely, we see that the business is currently a small scale business which is trying to become a small to mid scale business. This claim is supported by the fact that there is only one manufacturing plant and three warehouses. And here, we also need to have the knowledge of the fact that small business major aim is to keep the cost low and satisfy the customers by making good products. So we need to suggest what information system is best suited for small scale business enterprises.

The best recommendation would be to start with a Transaction Processing System(TPS). This system will process all the day to day transactions of the system. It is like a real time system where users interact with the TPS and generate, retrieve and modify the data. This TPS would be very helpful in lowering the cost of production and at the same time manufacture and produce standard quality products . Also TPS can help in communicating with other vendors.

But TPS along would not be sufficient. Also Management Information System(MIS) would be required that can get the data from the TPS and process it to get vital information. This MIS will help in generating information regarding the sales and inventory data about the current and well as previous years. Also MIS can create many types of graphical reports which help in tactical planning of the enterprise.

So a combination of TPS as well as MIS is a minimum requirement for a Zoom Vacuum to become successful in the market.


Related Questions

Implement the function get_stats The function get_stats calculates statistics on a sample of values. It does the following: its input parameter is a csv string a csv (comma separated values) string contains a list of numbers (the sample) return a tuple that has 3 values: (n, stdev, mean) tuple[0] is the number of items in the sample tuple[1] is the standard deviation of the sample tuple[2] is the mean of the sample

Answers

Answer:

Check the explanation

Explanation:

PYTHON CODE: (lesson.py)

import statistics

# function to find standard deviation, mean

def get_stats(csv_string):

   # calling the function to clean the data

   sample=clean(csv_string)

   # finding deviation, mean

   std_dev=statistics.stdev(sample)

   mean=statistics.mean(sample)

   # counting the element in sample

   count=len(sample)

   # return the results in a tuple

   return (count, std_dev, mean)

# function to clean the csv string

def clean(csv_string):

   # temporary list

   t=[]

   # splitting the string by comma

   data=csv_string.split(',')

 

   # looping item in data list

   for item in data:

       # removing space,single quote, double quote

       item=item.strip()

       item= item.replace("'",'')

       item= item.replace('"','')

       # if the item is valid      

       if item:

           # converting into float

           try:

             

               t.append(float(item))

           except:

               continue

   # returning the list of float

   return t

if __name__=='__main__':

   csv = "a, 1, '-2', 2.35, None,, 4, True"

   print(clean(csv))

   print(get_stats('1.0,2.0,3.0'))

Perform a Google search, using the Google hacking keywords to locate a page that has the word passwd (note the spelling) on the page but has the phrase "Index of" in the title. First, what was your search term. Second, what is the first URL in your list of results. Third, what exactly would you use this search to find?

Answers

Answer:

Following are the step to this question:

i) search "intitle passwd" in google search engine.

ii) Open first link of the page.

iii) use commands to access data.  

Explanation:

Google Hacking operates as follows of web engines like google and yahoo to find web pages and sensitive information, that are insecure. It builds on the idea that web pages index a large number of public pages and files and make their discovery easy to create the correct query.

In which, we search the above-given keyword, that will provide many links. In these links we select the first one and open it, it will provide an index, and search in this we use the search command in the database.

Evaluati urmatoarele expresii


5+2*(x+4)/3, unde x are valoare 18


7/ 2*2+4*(5+7*3)>18


2<=x AND x<=7 , unde x are valoare 23


50 %10*5=


31250/ 5/5*2=

Answers

Answer:

A) 22 ⅓

B) 111>18

C) There is an error in the expression

D) 25

E) 62500

Question:

Evaluate the following expressions

A) 5 + 2 * (x + 4) / 3, where x has a value of 18

B) 7/2 * 2 + 4 * (5 + 7 * 3) & gt; 18

C) 2 <= x AND x<= 7, where x has value 23

D) 50% 10 * 5 =

F) 31250/5/5 * 2 =

Explanation:

A) 5 + 2 * (x + 4) / 3

x = 18

First we would insert the value of x

5 + 2 * (x + 4) / 3

5 + 2(18 + 8) / 3

Then we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.

= 5 + 2(26) / 3

= 5 + 52/3

= 5 + 17 ⅓

= 22 ⅓

B) 7/2 * 2 + 4 * (5 + 7 * 3) > 18

we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.

7/2 * 2 + 4 * (5 + 7 * 3) >18

= 7/2 × 2 + 4× (5 + 7 × 3)>18

= (7×2)/2 + 4× (5+21) >18

= 14/2 + 4(26) >18

= 7 + 104 >18

= 111>18

C) 2 <= x AND x<= 7, where x has value 23

There is an error in the expression

D) 50% of 10 * 5

we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.

The 'of' expression means multiplication

= 50% × 10×5

= 50% × 50

50% = 50/100

=50/100 × 50

= 1/2 × 50

= 25

F) 31250/5/5 * 2

The expression has no demarcation. Depending on how it is broken up, we would arrive at different answers. Let's consider:

31250/(5/5 × 2)

Apply BODMAS

= 31250/[5/(5 × 2)]

= 31250/(5/10)

= 31250/(1/2)

Multiply by the inverse of 1/2 = 2/1

= 31250 × (2/1)

= 62500

You can use this area to create your resume.

Answers

Answer:

YOUR NAME

YOUR CITY, STATE, AND ZIP CODE

YOUR PHONE NUMBER

YOUR EMAIL

Professional Summary

Reliable, top-notch sales associate with outstanding customer service skills and relationship-building strengths. Dedicated to welcoming customers and providing comprehensive service. In-depth understanding of sales strategy and merchandising techniques. Dependable retail sales professional with experience in dynamic, high-performance environments. Skilled in processing transactions, handling cash, using registers and arranging merchandise. Maintains high-level customer satisfaction by smoothly resolving customer requests, needs and problems. Seasoned Sales Associate with consistent record of exceeding quotas in sales environments. Delivers exceptional customer service and product expertise to drive customer satisfaction ratings. Proficient in use and troubleshooting of POS systems.

Skills

Returns and Exchanges

Adaptable and Flexible

Excellent Written and Verbal Communication

Meeting Sales Goals

Strong Communication and Interpersonal Skills

Time Management

Cash Handling

Reliable and Responsible

Work History

March 2020 to September 2021

Goodwill OF YOUR STATE

Retail Sales Associate    

Helped customers complete purchases, locate items and join reward programs.

Checked pricing, scanned items, applied discounts and printed receipts to ring up customers.

Folded and arranged merchandise in attractive displays to drive sales.

Greeted customers and helped with product questions, selections and purchases.

Organized store merchandise racks and displays to promote and maintain visually appealing environments.

Monitored sales floor and merchandise displays for presentable condition, taking corrective action such as restocking or reorganizing products.

Balanced and organized cash register by handling cash, counting change and storing coupons.

Trained new associates on cash register operations, conducting customer transactions and balancing drawer.

Answered questions about store policies and addressed customer concerns.

Issued receipts and processed refunds, credits or exchanges.

Maintained clean sales floor and straightened and faced merchandise.

Education

YOUR HIGH SCHOOL THAT YOU ATTEND  

Languages

Spanish

Explanation:

THIS IS MY RESUME IF YOU HAVE MORE WORK EXPERIENCE THEN ADD IT AFTER THE GOODWILL. I GOT A 100% ON EDGE.

Which of the following should be the first page of a report?
O Title page
Introduction
O Table of contents
Terms of reference

Answers

Answer:

Title page should be the first page of a report.

hope it helps!

A university wants to schedule the classrooms for final exams. The attributes are given below:
course : course id, name, and department
section : section id, enrollment, and dependent as a weak entity set on course
room : room number, capacity, and building
exam: course id, section id, room number, and time.
1) Determine the relationships among these entity sets. Clearly specify the arity, the attributes, and the mapping cardinality of these relationships.
2) Construct an E-R diagram to for the scheduling system.

Answers

Answer:

See explaination

Explanation:

Clearly the entities are as follows:-

Course

Section

Room

Test

The relationship among entities are as follows:-

Course has Section

Test is conducted for Course

Test is conducted in Section

Test is conducted in Room

Attributes of each entities are as follows:-

Course (CourseID, Name, Department)

Section (SectionID, Enrollment)

Room (RoomNumber, Capacity, Building)

Test (Time)

Section is a week entity as, there may be same sections for different courses, therefore section uses the primary key of course entity as foreign key.

Also entity Test is dependent upon the entities Room,Section and Course, therefore primary keys of these entities will be used as foreign key in the Test entity.

Check attachment for the ER diagram

Zoom Vacuum, a family-owned manufacturer of high-end vacuums, has grown exponentially over the last few years. However, the company is having difficulty preparing for future growth. The only information system used at Zoom is an antiquated accounting system. The company has one manufacturing plant located in Iowa; and three warehouses, in Iowa, New Jersey, and Nevada. The Zoom sales force is national, and Zoom purchases about 25 percent of its vacuum parts and materials from a single overseas supplier. You have been hired to recommend the information systems Zoom should implement in order to maintain their competitive edge. However, there is not enough money for a full-blown, cross-functional enterprise application, and you will need to limit the first step to a single functional area or constituency. What will you choose, and why?

Answers

Answer:A TPS focusing on production and manufacturing to keep production costs low while maintaining quality, and for communicating with other possible vendors. The TPS would later be used to feed MIS and other higher level systems.

Explanation:

#define DIRECTN 100
#define INDIRECT1 20
#define INDIRECT2 5
#define PTRBLOCKS 200

typedef struct {
filename[MAXFILELEN];
attributesType attributes; // file attributes
uint32 reference_count; // Number of hard links
uint64 size; // size of file
uint64 direct[DIRECTN]; // direct data blocks
uint64 indirect[INDIRECT1]; // single indirect blocks
uint64 indirect2[INDIRECT2]; // double indirect

} InodeType;

Single and double indirect inodes have the following structure:

typedef struct
{
uint64 block_ptr[PTRBLOCKS];
}
IndirectNodeType;

Required:
Assuming a block size of 0x1000 bytes, write pseudocode to return the block number associated with an offset of N bytes into the file.

Answers

Answer:

WOW! that does not look easy!

Explanation:

I wish i could help but i have no idea how to do that lol

The relationship between the temperature of a fluid (t, in seconds), temperature (T, in degrees Celsius), is dependent upon the initial temperature of the liquid (T0, in degrees Celsius), the ambient temperature of the surroundings (TA, in degrees Celsius) and the cooling constant (k, in hertz); the relationship is given by: ???? ???? ???????? ???? ???????????? ???? ???????????? ???????????????? Ask the user the following questions:  From a menu, choose fluid ABC, FGH, or MNO.  Enter the initial fluid temperature, in units of degrees Celsius.  Enter the time, in units of minutes.  Enter the ambient air temperature, in units of degrees Celsius. Enter the following data into the program. The vector contains the cooling constant (k, units of hertz) corresponding to the menu entries. K Values = [0.01, 0.03, 0.02] Create a formatted output statement for the user in the Command Window similar to the following. The decimal places must match. ABC has temp 83.2 degrees Celsius after 3 minutes. In

Answers

Answer:

See explaination

Explanation:

clc;

clear all;

close all;

x=input(' choose abc or fgh or mno:','s');

to=input('enter intial fluid temperature in celcius:');

t1=input('enter time in minutes:');

ta=input('enter ambient temperature in celcius:');

abc=1;

fgh=2;

mno=3;

if x==1

k=0.01;

elseif x==2

k=0.03;

else

k=0.02;

end

t=ta+((to-ta)*exp((-k)*t1));

X = sprintf('%s has temp %f degrees celcius after %d minutes.',x,t,t1);

disp(X);

Design a program for the Hollywood Movie Rating Guide, which can be installed in a kiosk in theaters. Each theater patron enters a value from 0 to 4 indicating the number of stars that the patron awards to the Rating Guide's featured movie of the week. If a user enters a star value that does not fall in the correct range, prompt the user continuously until a correct value is entered. The program executes continuously until the theater manager enters a negative number to quit. At the end of the program, display the average star rating for the movie.

Answers

Answer:

The program in cpp is given below.

#include <iostream>

using namespace std;

int main()

{

   //variables declared to hold sum, count and average of movie ratings

   int sum=0;

   int count=0;

   int rating;

   double avg;

   //audience is prompted to enter ratings

   do{

       std::cout << "Enter the rating (0 to 4): ";

       cin>>rating;

       if(rating>4)

           std::cout << "Invalid rating. Please enter correct rating again." << std::endl;

       if(rating>=0 && rating<=4)

       {

           sum=sum+rating;

           count++;

       }

       if(rating<0)

           break;

   }while(rating>=0);

   //average rating is computed

   avg=sum/count;

   std::cout << "The average rating for the movie is " << avg << std::endl;  

   return 0;

}

OUTPUT

Enter the rating (0 to 4): 1

Enter the rating (0 to 4): 2

Enter the rating (0 to 4): 0

Enter the rating (0 to 4): 5

Invalid rating. Please enter correct rating again.

Enter the rating (0 to 4): 1

Enter the rating (0 to 4): -1

The average rating for the movie is 1

Explanation:

1. Variables are declared to hold the rating, count of rating, sum of all ratings and average of all the user entered ratings.

2. The variables for sum and count are initialized to 0.

3. Inside do-while loop, user is prompted to enter the rating for the movie.

4. In case the user enters a rating which is out of range, the user is prompted again to enter a rating anywhere from 0 to 4.

5. The loop executes until a negative number is entered.

6. Inside the loop, the running total sum of all the valid ratings is computed and the count variable is incremented by 1 for each valid rating.

7. Outside the loop, the average is computed by dividing the total rating by count of ratings.

8. The average rating is then displayed to the console.

9. The program is written in cpp due to simplicity since all the code is written inside main().

How can u refer to additional information while giving a presentation

Answers

Answer:

There are various ways: Handing out papers/fliers to people, or presenting slides.

Donnell backed up the information on his computer every week on a flash drive. Before copying the files to the flash drive, he always ran a virus scan against the files to ensure that no viruses were being copied to the flash drive. He bought a new computer and inserted the flash drive so that he could transfer his files onto the new computer. He got a message on the new computer that the flash drive was corrupted and unreadable; the information on the flash drive cannot be retrieved. Assuming that the flash drive is not carrying a virus, which of the following does this situation reflect?
a. Compromise of the security of the information on the flash drive
b. Risk of a potential breach in the integrity of the data on the flash drive
c. Both of the above
d. Neither of the above.

Answers

Answer:

b. Risk of a potential breach in the integrity of the data on the flash drive

Explanation:

The corrupted or unreadable file error is an error message generated if you are unable to access the external hard drive connected to the system through the USB port. This error indicates that the files on the external hard drive are no longer accessible and cannot be opened.

There are several reasons that this error message can appear:

Viruses and Malware affecting the external hard drive .Physical damage to external hard drive or USB memory .Improper ejection of removable drives.

Write a functionvector merge(vector a, vector b)that merges two vectors, alternating elements from both vectors. If one vector isshorter than the other, then alternate as long as you can and then append the remaining elements from the longer vector. For example, if a is 1 4 9 16and b is9 7 4 9 11then merge returns the vector1 9 4 7 9 4 16 9 1118. Write a predicate function bool same_elements(vector a, vector b)that checks whether two vectors have the same elements in some order, with the same multiplicities. For example, 1 4 9 16 9 7 4 9 11 and 11 1 4 9 16 9 7 4 9 would be considered identical, but1 4 9 16 9 7 4 9 11 and 11 11 7 9 16 4 1 would not. You will probably need one or more helper functions.19. What is the difference between the size and capacity of a vector

Answers

Answer:

see explaination for code

Explanation:

CODE

#include <iostream>

#include <vector>

using namespace std;

vector<int> merge(vector<int> a, vector<int> b) {

vector<int> result;

int k = 0;

int i = 0, j = 0;

while (i < a.size() && j < b.size()) {

if (k % 2 == 0) {

result.push_back(a[i ++]);

} else {

result.push_back(b[j ++]);

}

k ++;

}

while (i < a.size()) {

result.push_back(a[i ++]);

}

while(j < b.size()) {

result.push_back(b[j ++]);

}

return result;

}

int main() {

vector<int> a{1, 4, 9, 16};

vector<int> b{9, 7, 4, 9, 11};

vector<int> result = merge(a, b);

for (int i=0; i<result.size(); i++) {

cout << result[i] << " ";

}

}

Which statement is LEAST accurate? Select one: a. A common reason for ERP failure is that the ERP does not support one or more important business processes of the organization b. Implementing an ERP system has as much to do with changing the way an organization does business than it does with technology. c. The big-bang approach to ERP implementation is generally riskier than the phased in approach. d. To take full advantage of the ERP process, reengineering will need to occur.

Answers

Answer:

d. To take full advantage of the ERP process, re-engineering will need to occur.

Explanation:

Justification:  

ERP Implementation: ERP gives a change in technological ways for managing resources, the way to run the business is remained same but now Ft becomes well planned Diversified P units of Mich do not share common process. and data, generally employ phased-in approach of implementing ERP

• It is the way to overcome from the risk which is with the big bang approach, direct switching

• Perfect implementation of ERP needs re-engineering on the basis of performance

a. maintenance Sometimes ERP which is installed could not support one of the business process. due to lack of research before selecting it

• The statement that the diversified organizations. not. implement ERPs is least accurate because they implement it by employing phased-in approach Therefore, the correct option is d

Create a Binary Expressions Tree Class and create a menu driven programyour program should be able to read multiple expressions from a file and create expression trees for each expression, one at a timethe expression in the file must be in "math" notation, for example x+y*a/b.display the preorder traversal of a binary tree as a sequence of strings each separated by a tabdisplay the postorder traversal of a binary tree in the same form as aboveWrite a function to display the inorder traversal of a binary tree and place a (before each subtree and a )after each subtree. Don’t display anything for an empty subtree. For example, the expression tree should would be represented as ( (x) + ( ( (y)*(a) )/(b) ) )

Answers

Answer:

Explanation:

Program:

#include<iostream>

#include <bits/stdc++.h>

using namespace std;

//check for operator

bool isOperator(char c)

{

switch(c)

{

case '+': case '-': case '/': case '*': case '^':

return true;

}

return false;

}

//Converter class

class Converter

{

private:

string str;

public:

//constructor

Converter(string s):str(s){}

//convert from infix to postfix expression

string toPostFix(string str)

{

stack <char> as;

int i, pre1, pre2;

string result="";

as.push('(');

str = str + ")";

for (i = 0; i < str.size(); i++)

{

char ch = str[i];

if(ch==' ') continue;

if (ch == '(')

as.push(ch);

else if (ch == ')')

{

while (as.size() != 0 && as.top() != '('){

result = result + as.top() + " ";

as.pop();

}

as.pop();

}

else if(isOperator(ch))

{

while (as.size() != 0 && as.top() != '(')

{

pre1 = precedence(ch);

pre2 = precedence(as.top());

if (pre2 >= pre1){

result = result + as.top() + " ";

as.pop();

}

else break;

}

as.push(ch);

}

else

{

result = result + ch;

}

}

while(as.size() != 0 && as.top() != '(') {

result += as.top() + " ";

as.pop();

}

return result;

}

//return the precedence of an operator

int precedence(char ch)

{

int choice = 0;

switch (ch) {

case '+':

choice = 0;

break;

case '-':

choice = 0;

break;

case '*':

choice = 1;

break;

case '/':

choice = 1;

break;

case '^':

choice = 2;

default:

choice = -999;

}

return choice;

}

};

//Node class

class Node

{

public:

string element;

Node *leftChild;

Node *rightChild;

//constructors

Node (string s):element(s),leftChild(nullptr),rightChild(nullptr) {}

Node (string s, Node* l, Node* r):element(s),leftChild(l),rightChild(r) {}

};

//ExpressionTree class

class ExpressionTree

{

public:

//expression tree construction

Node* covert(string postfix)

{

stack <Node*> stk;

Node *t = nullptr;

for(int i=0; i<postfix.size(); i++)

{

if(postfix[i]==' ') continue;

string s(1, postfix[i]);

t = new Node(s);

if(!isOperator(postfix[i]))

{

stk.push(t);

}

else

{

Node *r = nullptr, *l = nullptr;

if(!stk.empty()){

r = stk.top();

stk.pop();

}

if(!stk.empty()){

l = stk.top();

stk.pop();

}

t->leftChild = l;

t->rightChild = r;

stk.push(t);

}

}

return stk.top();

}

//inorder traversal

void infix(Node *root)

{

if(root!=nullptr)

{

cout<< "(";

infix(root->leftChild);

cout<<root->element;

infix(root->rightChild);

cout<<")";

}

}

//postorder traversal

void postfix(Node *root)

{

if(root!=nullptr)

{

postfix(root->leftChild);

postfix(root->rightChild);

cout << root->element << " ";

}

}

//preorder traversal

void prefix(Node *root)

{

if(root!=nullptr)

{

cout<< root->element << " ";

prefix(root->leftChild);

prefix(root->rightChild);

}

}

};

//main method

int main()

{

string infix;

cout<<"Enter the expression: ";

cin >> infix;

Converter conv(infix);

string postfix = conv.toPostFix(infix);

cout<<"Postfix Expression: " << postfix<<endl;

if(postfix == "")

{

cout<<"Invalid expression";

return 1;

}

ExpressionTree etree;

Node *root = etree.covert(postfix);

cout<<"Infix: ";

etree.infix(root);

cout<<endl;

cout<<"Prefix: ";

etree.prefix(root);

cout<<endl;

cout<< "Postfix: ";

etree.postfix(root);

cout<<endl;

return 0;

}

Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
import java.util.Scanner; public class RecursiveCalls { public static void backwardsAlphabet(char currLetter) { if (currLetter == 'a') { System.out.println(currLetter); } else { System.out.print(currLetter + " "); backwardsAlphabet((char)(currLetter - 1)); } } public static void main (String [] args) { Scanner scnr = new Scanner(System.in); char startingLetter; startingLetter = scnr.next().charAt(0); /* Your solution goes here */ } }

Answers

Answer:

Following are the code to method calling

backwardsAlphabet(startingLetter); //calling method backwardsAlphabet

Output:

please find the attachment.

Explanation:

Working of program:

In the given java code, a class "RecursiveCalls" is declared, inside the class, a method that is "backwardsAlphabet" is defined, this method accepts a char parameter that is "currLetter". In this method a conditional statement is used, if the block it will check input parameter value is 'a', then it will print value, otherwise, it will go to else section in this block it will use the recursive function that prints it's before value. In the main method, first, we create the scanner class object then defined a char variable "startingLetter", in this we input from the user and pass its value into the method that is "backwardsAlphabet".

Write a program that uses the map template class to compute a histogram of positive numbers entered by the user. The map’s key should be the number that is entered, and the value should be a counter of the number of times the key has been entered so far. Use –1 as a sentinel value to signal the end of user input.512355321-1Then the program should output the followings:The number 3 occurs 2 timesThe number 5 occurs 3 timesThe number 12 occurs 1 timesThe

Answers

Answer:

See explaination

Explanation:

#include <iostream>

#include <map>

#include <string>

#include <algorithm>

#include <cstdlib>

#include <iomanip>

using namespace std;

int main()

{

map<int, int> histogram;

int a=0;

while(a>=0)

{

cout << " enter value of a" ;

cin >>a;

histogram[a]++;

}

map<int,int>::iterator it;

for ( it=histogram.begin() ; it != histogram.end(); it++ )

{

cout << (*it).first << " occurs " << setw(3) << (*it).second << (((*it).second == 1) ? " time." : " times.") <<endl;

}

return 0;

}

In this question, we give two implementations for the function: def intersection_list(lst1, lst2) This function is given two lists of integers lst1 and lst2. When called, it will create and return a list containing all the elements that appear in both lists. For example, the call: intersection_list([3, 9, 2, 7, 1], [4, 1, 8, 2])could create and return the list [2, 1]. Note: You may assume that each list does not contain duplicate items. a) Give an implementation for intersection_list with the best worst-case runtime. b) Give an implementation for intersection_list with the best average-case runtime.

Answers

Answer:

see explaination

Explanation:

a)Worst Case-time complexity=O(n)

def intersection_list(lst1, lst2):

lst3 = [value for value in lst1 if value in lst2]

return lst3

lst1 = []

lst2 = []

n1 = int(input("Enter number of elements for list1 : "))

for i in range(0, n1):

ele = int(input())

lst1.append(ele) # adding the element

n2 = int(input("Enter number of elements for list2 : "))

for i in range(0, n2):

ele = int(input())

lst2.append(ele) # adding the element

print(intersection_list(lst1, lst2))

b)Average case-time complexity=O(min(len(lst1), len(lst2))

def intersection_list(lst1, lst2):

return list(set(lst1) & set(lst2))

lst1 = []

lst2 = []

n1 = int(input("Enter number of elements for list1 : "))

for i in range(0, n1):

ele = int(input())

lst1.append(ele)

n2 = int(input("Enter number of elements for list2 : "))

for i in range(0, n2):

ele = int(input())

lst2.append(ele)

print(intersection_list(lst1, lst2))

Which of the following can be created when two tables contain a common field?
Referential key
Primary key
Key template
Relationship

Answers

Answer:

Referential key is the correct answer to the given question .

Explanation:

The Referential key is also known as foreign key .In the Referential key the foreign key table field  must be match with the field of primary key table in another table .  

The main objective of Referential key providing the interaction between the two tables also the Referential key is  provides the concept of referential integrity .

Primary key is used find the unique record in the database they are not created when the two tables contain the common field so that's why it is incorrect option.Key template  and Relationship are not providing the linking between the two tables that's why it is incorrect option .

Help its simple but I don't know the answer!!!

If you have a -Apple store and itunes gift card-

can you use it for in app/game purchases?

Answers

Answer:

yes you can do that it's utter logic

Answer:

Yes.

Explanation:

Itunes gift cards do buy you games/movies/In app purchases/ect.

the smallest unit of time in music called?

Answers

Answer:

Ready to help ☺️

Explanation:

A tatum is a feature of music that has been defined as the smallest time interval between notes in a rhythmic phrase.

Answer:

A tatum bc is a feature of music that has been variously defined as the smallest time interval between successive notes in a rhythmic phrase "the shortest durational value

Create a macro named mReadInt that reads a 16- or 32-bit signed integer from standard input and returns the value in an argument. Use conditional operators to allow the macro to adapt to the size of the desired result. Write a program that tests the macro, passing it operands of various sizes.

Answers

Answer:

;Macro mReadInt definition, which take two parameters

;one is the variable to save the number and other is the length

;of the number to read (2 for 16 bit and 4 for 32 bit) .

%macro mReadInt 2

mov eax,%2

cmp eax, "4"

je read2

cmp eax, "2"

je read1

read1:

mReadInt16 %1

cmp eax, "2"

je exitm

read2:

mReadInt32 %1

exitm:

xor eax, eax

%endmacro

;macro to read the 16 bit number, parameter is number variable

%macro mReadInt16 1

mov eax, 3

mov ebx, 2

mov ecx, %1

mov edx, 5

int 80h

%endmacro

;macro to read the 32 bit number, parameter is number variable

%macro mReadInt32 1

mov eax, 3

mov ebx, 2

mov ecx, %1

mov edx, 5

int 80h

%endmacro

;program to test the macro.

;data section, defining the user messages and lenths

section .data

userMsg db 'Please enter the 32 bit number: '

lenUserMsg equ $-userMsg

userMsg1 db 'Please enter the 16 bit number: '

lenUserMsg1 equ $-userMsg1

dispMsg db 'You have entered: '

lenDispMsg equ $-dispMsg

;.bss section to declare variables

section .bss

;num to read 32 bit number and num1 to rad 16-bit number

num resb 5

num1 resb 3

;.text section

section .text

;program start instruction

global _start

_start:

;Displaying the message to enter 32bit number

mov eax, 4

mov ebx, 1

mov ecx, userMsg

mov edx, lenUserMsg

int 80h

;calling the micro to read the number

mReadInt num, 4

;Printing the display message

mov eax, 4

mov ebx, 1

mov ecx, dispMsg

mov edx, lenDispMsg

int 80h

;Printing the 32-bit number

mov eax, 4

mov ebx, 1

mov ecx, num

mov edx, 4

int 80h

;displaying message to enter the 16 bit number

mov eax, 4

mov ebx, 1

mov ecx, userMsg1

mov edx, lenUserMsg1

int 80h

;macro call to read 16 bit number and to assign that number to num1

;mReadInt num1,2

;calling the display mesage function

mov eax, 4

mov ebx, 1

mov ecx, dispMsg

mov edx, lenDispMsg

int 80h

;Displaying the 16-bit number

mov eax, 4

mov ebx, 1

mov ecx, num1

mov edx, 2

int 80h

;exit from the loop

mov eax, 1

mov ebx, 0

int 80h

Explanation:

For an assembly code/language that has the conditions given in the question, the program that tests the macro, passing it operands of various sizes is given below;

;Macro mReadInt definition, which take two parameters

;one is the variable to save the number and other is the length

;of the number to read (2 for 16 bit and 4 for 32 bit) .

%macro mReadInt 2

mov eax,%2

cmp eax, "4"

je read2

cmp eax, "2"

je read1

read1:

mReadInt16 %1

cmp eax, "2"

je exitm

read2:

mReadInt32 %1

exitm:

xor eax, eax

%endmacro

;macro to read the 16 bit number, parameter is number variable

%macro mReadInt16 1

mov eax, 3

mov ebx, 2

mov ecx, %1

mov edx, 5

int 80h

%endmacro

;macro to read the 32 bit number, parameter is number variable

%macro mReadInt32 1

mov eax, 3

mov ebx, 2

mov ecx, %1

mov edx, 5

int 80h

%endmacro

;program to test the macro.

;data section, defining the user messages and lenths

section .data

userMsg db 'Please enter the 32 bit number: '

lenUserMsg equ $-userMsg

userMsg1 db 'Please enter the 16 bit number: '

lenUserMsg1 equ $-userMsg1

dispMsg db 'You have entered: '

lenDispMsg equ $-dispMsg

;.bss section to declare variables

section .bss

;num to read 32 bit number and num1 to rad 16-bit number

num resb 5

num1 resb 3

;.text section

section .text

;program start instruction

global _start

_start:

;Displaying the message to enter 32bit number

mov eax, 4

mov ebx, 1

mov ecx, userMsg

mov edx, lenUserMsg

int 80h

;calling the micro to read the number

mReadInt num, 4

;Printing the display message

mov eax, 4

mov ebx, 1

mov ecx, dispMsg

mov edx, lenDispMsg

int 80h

;Printing the 32-bit number

mov eax, 4

mov ebx, 1

mov ecx, num

mov edx, 4

int 80h

;displaying message to enter the 16 bit number

mov eax, 4

mov ebx, 1

mov ecx, userMsg1

mov edx, lenUserMsg1

int 80h

;macro call to read 16 bit number and to assign that number to num1

;mReadInt num1,2

;calling the display mesage function

mov eax, 4

mov ebx, 1

mov ecx, dispMsg

mov edx, lenDispMsg

int 80h

;Displaying the 16-bit number

mov eax, 4

mov ebx, 1

mov ecx, num1

mov edx, 2

int 80h

;exit from the loop

mov eax, 1

mov ebx, 0

int 80h

What is the best thing to do if you only want your close friends to be able to see your posts?
A
Avoid posting details about your life.

B
Check your privacy settings.

C
Choose your posts carefully.

D
Only post photos instead of comments.

Answers

The answer is B (check your privacy settings) because almost all apps and websites have privacy settings that give you some options for who is allowed to see your posts.

Also, the other three answer choices don’t really respond to the question because they are not about who sees your posts, but what your posts are about.

Answer:

check privacy settings. There will be a filter i am pretty sure :)


(a) What is the difference between a compare validator and a range validator?

(b) When would you choose to use one versus the other?

Answers

Answer:

Check the explanation

Explanation:

a) A compare validator: A compare validator can be described as a particular method that is utilized to control and also enabled to perform different types of validation tasks. It is being used to carry out as well as to execute a correct data type that determines the entered value is proper value into a form field or not. For instance when in an application registration it makes use of the confirm password after the first-password.

(b) Whenever it is compulsory to determine if the value that has been entered is the correct value into the form field then the usage of compare validator will be needed whereas a range validator is used to confirm the entered value is in a specific range.

Explanation:

a) A compare validator: A compare validator can be described as a particular method that is utilized to control and also enabled to perform different types of validation tasks. It is being used to carry out as well as to execute a correct data type that determines the entered value is proper value into a form field or not. For instance when in an application registration it makes use of the confirm password after the first-password.

(b) Whenever it is compulsory to determine if the value that has been entered is the correct value into the form field then the usage of compare validator will be needed whereas a range validator is used to confirm the entered value is in a specific range.

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string.

Ex: If the input is:

n Monday
the output is:

1
Ex: If the input is:

z Today is Monday
the output is:

0
Ex: If the input is:

n It's a sunny day
the output is:

2
Case matters.

Ex: If the input is:

n Nobody
the output is:

0
n is different than N.





This is what i have so far.
#include
#include
using namespace std;

int main() {

char userInput;
string userStr;
int numCount;

cin >> userInput;
cin >> userStr;

while (numCount == 0) {
cout << numCount << endl;
numCount = userStr.find(userInput);

}
return 0;
}


Answers

Here is a Python program:

tmp = input().split(' ')
c = tmp[0]; s = tmp[1]
ans=0
for i in range(len(s)):
if s[i] == c: ans+=1

# the ans variable stores the number of occurrences
print(ans)

Assume the class Student implements the Speaker interface from the textbook. Recall that this interface includes two abstract methods, speak( ) and announce(String str). A Student contains one instance data, String class Rank. Write the Student class so that it implements Speaker as follows. The speak method will output "I am a newbie here" if the Student is a "Freshman", "I like my school" if the Student is either a "Sophomore" or a "Junior", or "I can not wait to graduate" if the student is a "Senior". The announce method will output "I am a Student, here is what I have to say" followed by the String parameter on a separate line. Finally, the class Rank is initialized in the constructor. Only implement the constructor and the methods to implement the Speaker interface.

Answers

Answer:

Check the explanation

Explanation:

Based on the above information, this the following resulting code.

The solution has namely one interface named Speaker, one class called Student and one Main class called StudentMain.

The StudentMain class just initialize various instances of the Student class with various classRank values and then subsequently calling in the speak() methods of all.

announce() method is called on one such instance of Student class to demonstrate its functioning.

Comments are added at required place to better help in understanding the logic.

Speaker.java

public interface Speaker {

 

  abstract void speak();

  abstract void announce(String str);

}

Student.java

public class Student implements Speaker {

  /*

  * Write the Student class so that it implements Speaker as follows.

  The speak method will output "I am a newbie here" if the Student is a "Freshman",

  "I like my school" if the Student is either a "Sophomore" or a "Junior",

  or "I can not wait to graduate" if the student is a "Senior".

  The announce method will output "I am a Student, here is what I have to say" followed by the String parameter on a separate line.

  */

  String classRank;

 

 

  // Based on the requirement taking in classRank String as a constructor parameter

  public Student(String classRank) {

      super();

      this.classRank = classRank;

  }

// Using the switch-case to code the above requirment

  public void speak() {

      switch(classRank) {

     

      case "Freshman":

          System.out.println("I am a newbie here");

          break;

      // This case would output the same result for the 2 case conditions

      case "Sophomore":

      case "Junior":

          System.out.println("I like my school");

          break;

         

      case "Senior":

          System.out.println("I can not wait to graduate");

          break;

      default:

          System.out.println("Unknown classRank inputted");

      }

     

  }

  //Based on the requirement, first line is printed first after second which is

  // the inputted String parameter

  public void announce(String str) {

      System.out.println("I am a Student, here is what I have to say");

      System.out.println(str);

  }

}

StudentMain.java

public class StudentMain {

 

  public static void main(String[] args) {

     

      // Initializing all the Objects with required classRank

      Student stu1=new Student("Freshman");

      Student stu2=new Student("Sophomore");

      Student stu3=new Student("Junior");

      Student stu4=new Student("Senior");

      Student stu5=new Student("Freshman");

     

      //Calling the speak methods of the all the above create objects

      stu1.speak();

      stu2.speak();

      stu3.speak();

      stu4.speak();

      stu4.speak();

      stu4.announce("Wish u all the best");

  }

}

Following is the output generated from the code run.

A cloud provider is deploying a new SaaS product comprised of a cloud service. As part of the deployment, the cloud provider wants to publish a service level agreement (SLA) that provides an availability rating based on its estimated availability over the next 12 months. First, the cloud provider estimates that, based on historical data of the cloud environment, there is a 25% chance that the physical server hosting the cloud service will crash and that such a crash would take 2 days before the cloud service could be restored. It is further estimated that, over the course of a 12 month period, there will be various attacks on the cloud service, resulting in a total of 24 hours of downtime. Based on these estimates, what is the availability rating of the cloud service that should be published in the SLA?

Answers

Answer:

99.6

Explanation:

The cloud provider  provides the certain modules of the cloud service like infrastructure as a service , software as a service ,etc to other companies .The cloud provider implements a new SaaS service that includes a cloud platform also the cloud provider intends to disclose the Service Level Agreement that is score based on its approximate accessibility during the next 12 months.

The Cloud providers predict that, depending on past cloud system data, it is a 25 % risk that a physical server holding the cloud platform will fail therefore such a failure will require 2 days to recover the cloud service so 99.6 is the Cloud storage accessibility ranking, to be released in the SLA.

Algorithmic Complexity: what is the asymptotic complexity (Big-O) of each code section? Identify the critical section of each.\ Line 1: for (int i=0; i<532; i++) { f(n) = O( ) Line 2: for (int j=1; j

Answers

Answer:

Check the explanation

Explanation:

1) f(n) = O( 1 ), since the loops runs a constant number of times independent of any input size

there is no critical section in the code, as a critical section is some part of code which is shared by multiple threads or even processes to modify any shared variable.This code does not contain any variable which can be shared.

2) f(n) = O( log n! ), the outer loop runs for n times, and the inner loop runs log k times when i = k,ie the total number of print will be – log 1 + log2 +log3 +log4+…...+ log n = log (1 . 2 . 3 . 4 . ……. . n ) =log n!

there is no critical section in the code, as a critical section is some part of code which is shared by multiple threads or even processes to modify any shared variable.This code does not contain any variable which can be shared.

Note : Log (m *n) = Log m + Log n : this is property of logarithm

3) f(n) = [tex]O( n^2 )[/tex], since both outer and inner loop runs n times hence , the total iterations of print statement will be : n +n+n+…+n

for n times, this makes the complexity – n * n = n2

there is no critical section in the code, as a critical section is some part of code which is shared by multiple threads or even processes to modify any shared variable.This code does not contain any variable which can be shared.

You work at a cheeseburger restaurant. Write a program that determines appropriate changes to a food order based on the user’s dietary restrictions. Prompt the user for their dietary restrictions: vegetarian, lactose intolerant, or none. Then using if statements and else statements, print the cook a message describing how they should modify the order. The following messages should be used: - If the user enters "lactose intolerant", say "No cheese." - If the user enters "vegetarian", say "Veggie burger." - If the user enters "none", say "No alterations."

Answers

Answer:

See explaination

Explanation:

dietary_restrictions = input("Any dietary restrictions?: ")

if dietary_restrictions=="lactose intolerant":

print("No cheese")

elif dietary_restrictions == "vegetarian":

print("Veggie burger")

else:

print("No alteration")

Reggie receives a phone call from a computer user at his company who says that his computer would not turn on this morning. After asking questions, Reggie realizes that the computer seems to turn on because the user can hear fans spinning and the indicator light comes on and flashes during the boot. The Num Lock key is on, but there is no video on the monitor. Reggie also learns that the computer has a new video card. The night before the computer was working fine, according to the user. Reggie tests the video cord and the monitor. When Reggie reattaches the video cable to the video card port, the computer appears to be working. What might be the problem?

Answers

Answer:

The Integrated video may not be working properly well or functioning well.

Explanation:

Solution:

In this case, it is known that the computer was working fine a night before the problem.

If the video cable is connected to a wrong video port, then the computer was unable to work previous night.the integrated video cord has not seated because most times it occurs, due to the heat sink in the card. after restoring the video cable to the video card port, it works.

If the video was disabled in  BIOS/UEFI, it does not show video, even after restoring the cable.

Other Questions
All of the following shaped U.S. public opinion about the Vietnam war except:A Growing number of casualtiesB Being told the war was winnable, but seeing kaos on televisionC Anti-war protests throughout the countryD All of the above shaped public opinion The article "Snow Cover and Temperature Relationships in North America and Eurasia" used statistical techniques to relate the amount of snow cover on each continent to average continental temperature. Data presented there included the following ten observations on October snow cover for Eurasia during the years 1970-1979 (in million km2): 6.5 12.0 14.9 10.0 10.7 7.9 21.9 12.5 14.5 9.2 What would you report as a representative, or typical, value of October snow cover for this period, and what prompted your choice? What type of element is generally largest FOR The Outsiders Read the following quote: They used to be buddies, I thought, they used to be friends, and now they hate each other because one has to work for a living and the other comes from the west side. They shouldnt hate each otherI dont hate the socs anymorethey shouldnt hate (p 151) Why did Pony stop hating the Socs? Do you think hes telling the truth or lying to himself and why? The large, grazing mammals typical of specific _______ biomes known as savannas include elephants, zebras, and giraffes. A. grassland B. desert C. taiga D. temperate forest Two datasets arranged in descending order are; {8, , 4,1} and {9, , 5,2}. If the medians of the two given datasets are equal, what is the value of ( )2? f(n)=93+4(n-1) Complete the recursive formula of f(n) Scarcity is the central problem that all people face, and it is the focus of __________.A.politicsB.scienceC.economicsD.agriculturePlease select the best answer from the choices providedABCD Find the measure of angle U On January 1, 2019, Broker Corp. issued $2,200,000 par value 9%, 9-year bonds which pay interest each December 31. If the market rate of interest was 11%, what was the issue price of the bonds? (The present value factor for $1 in 9 periods at 9% is 0.4604 and at 11% is 0.3909. The present value of an annuity of $1 factor for 9 periods at 9% is 5.9952 and at 11% is 5.5370.) Number of Days Past Due Toot Auto Supply distributes new and used automobile parts to local dealers throughout the Midwest. Toots credit terms are n/30. As of the end of business on October 31, the following accounts receivable were past due: Account Due Date Amount Avalanche Auto August 15 $12,000 Bales Auto October 4 2,400 Derby Auto Repair June 26 3,900 Lucky's Auto Repair September 10 6,600 Pit Stop Auto September 24 1,100 Reliable Auto Repair July 2 9,750 Trident Auto August 25 1,800 Valley Repair & Tow May 23 4,000 Determine the number of days each account is past due as of October 31. Account Due Date Number of Days Past Due Avalanche Auto August 15 Bales Auto October 4 Derby Auto Repair June 26 Lucky's Auto Repair September 10 Pit Stop Auto September 24 Reliable Auto Repair July 2 Trident Auto August 25 Valley Repair & Tow May 23 Which statement must be true? Please I need help with this one Please help me now plz I will mark you brainliest Meryl needs to cut down 10.5 trees for every 5 cabins she builds. how many trees would she need to build 7 cabins How can a brook sing a farewell song?How can leaves sleep?How can leaves dance and fly? -2.01=5.5b+2.01=5.510c=13.71100d=13.71Help. wil give bianleast What are the first four terms in the multiplication pattern given by the formula: 2 4n?8, 32, 128, 5128, 32, 64, 5122, 8, 32, 128,32, 128, 512, 2048 What type of correlation is shown by the graph? What is the remainder when f(x) = x2 + 14x 8 is divided by (x 3)?