Answer:
key enter
Explanation:
May this help you l think
. In the select algorithm that finds the median we divide the input elements into groups of 5. Will the algorithm work in linear time if we divide it into groups of 7? How about 3? Explain your answer--- the asymptotic run time in either case.
Answer:
we have that it grows more quickly than linear.
Explanation:
It will still work if they are divided into groups of 77, because we will still know that the median of medians is less than at least 44 elements from half of the \lceil n / 7 \rceil⌈n/7⌉ groups, so, it is greater than roughly 4n / 144n/14 of the elements.
Similarly, it is less than roughly 4n / 144n/14 of the elements. So, we are never calling it recursively on more than 10n / 1410n/14 elements. T(n) \le T(n / 7) + T(10n / 14) + O(n)T(n)≤T(n/7)+T(10n/14)+O(n). So, we can show by substitution this is linear.
We guess T(n) < cnT(n)<cn for n < kn<k. Then, for m \ge km≥k,
\begin{aligned} T(m) & \le T(m / 7) + T(10m / 14) + O(m) \\ & \le cm(1 / 7 + 10 / 14) + O(m), \end{aligned}
T(m)
≤T(m/7)+T(10m/14)+O(m)
≤cm(1/7+10/14)+O(m),
therefore, as long as we have that the constant hidden in the big-Oh notation is less than c / 7c/7, we have the desired result.
Suppose now that we use groups of size 33 instead. So, For similar reasons, we have that the recurrence we are able to get is T(n) = T(\lceil n / 3 \rceil) + T(4n / 6) + O(n) \ge T(n / 3) + T(2n / 3) + O(n)T(n)=T(⌈n/3⌉)+T(4n/6)+O(n)≥T(n/3)+T(2n/3)+O(n) So, we will show it is \ge cn \lg n≥cnlgn.
\begin{aligned} T(m) & \ge c(m / 3)\lg (m / 3) + c(2m / 3) \lg (2m / 3) + O(m) \\ & \ge cm\lg m + O(m), \end{aligned}
T(m)
≥c(m/3)lg(m/3)+c(2m/3)lg(2m/3)+O(m)
≥cmlgm+O(m),
therefore, we have that it grows more quickly than linear.
Output is the act of is the act of entering the data to the computer?
Answer:
Output is the act of the computer display information based on your input
Explanation:
Funny thing is that output is the exact opposite of what you just described
Kirk (2019) states that the topic of color can be a minefield. The judgement involved with selecting the right amount of color for a particular application can be daunting. With regards to visualizations, there are different levers that can be adjusted to create the desired effects (Kirk, 2019). The levers are associated with the HSL (Hue, Saturation, Lightness) color cylinder. Select and elaborate on one of the following:
a. Color Hue Spectrum
b. Color Saturation Spectrum
c. Color Lightness Spectrum
Answer:
Explanation:
Answer:
Explanation:
Answer:
a
Explanation:
a. Color Hue Spectrum
Qla
What are the activities a Database Designer will do if using the SDLC to design a Database [10]
Q1b
List the five main components of Access Database and state their uses [10]
Answer:a
What are the activities a Database Designer will do if using the SDLC to design a Database [10]
Q1b
List the five main components of Access Database and state their uses [1
Explanation:
2- (8 point) Write a program using the instructions below. Assume that integers are stored in 4 bytes. a) Define an array of type int called apples with five elements, and initialize the elements to the even integers from 2 to 10. b) Define a pointer aPtr that points to a variable of type int. c) Print the elements of array values using a for statement. d) Write two separate statements that assign the starting address of the array to pointer variable aPtr. e) What physical address is aPtr pointing to? f) Print the elements of array values using pointer/offset notation. g) What address is referenced by aPtr + 3? What value is stored at that location? h) Assuming aPtr points to apples[4], what address is referenced by aPtr -= 4? What value is stored at that location?
Answer:
a)
int apples [5] = {2, 4, 6, 8, 10};
b)
int *aPtr //this is the pointer to int
Another way to attach a pointer to a an int variable that already exists:
int * aPtr;
int var;
aPtr = &var;
c)
for (int i = 0; i < size; i++){
cout << values[i] << endl; }
d)
aPtr = values;
aPtr = &values[0];
both the statements are equivalent
e)
If its referring to the part d) then the address is:
cout<<aPtr;
f)
for (int i = 0; i < size; ++i) {
cout<<*(vPtr + i)<<endl; }
g)
cout << (aPtr + 3) << endl; // address referenced by aPtr + 3
cout << *(aPtr + 3) << endl; // value stored at that location
This value stored at location is 8
h)
aPtr = &apples[4];
aPtr -= 4;
cout<<aPtr<<endl;
cout<<*aPtr<<endl;
Explanation:
a)
int apples [5] = {2, 4, 6, 8, 10};
In this statement the array names is apples, the size of the array is specified in square brackets. so the size is 5. The type of array apples is int this means it can store integer elements. The values or elements of the array apples are even integers from 2 to 10. So the elements of array are:
apples[0] = 2
apples[1] = 4
apples[2] = 6
apples[3] = 8
apples[4] = 10
b)
In this statement int *aPtr
The int* here is used to make the pointer aPtr points to integer object. Data type the pointer is pointing to is int. The asterisk symbol used with in makes this variable aPtr a pointer.
If there already exists an int type variable i.e. var and we want the pointer to point to that variable then declare an int type pointer aPtr and aPtr = &var; assigns the address of variable var to aPtr.
int * aPtr;
int var;
aPtr = &var;
c)
The complete program is:
int size= 5;
int values[size] = {2,4,6,8,10};
for (int i = 0; i < size; i++){
cout << values[i] << endl; }
The size of array is 5. The name of array is values. The elements of array are 2,4,6,8,10.
To print each element of the values array using array subscript notation, the variable i is initialized to 0, because array index starts at 0. The cout statement inside body of loop prints the element at 0-th index i.e. the first element of values array at first iteration. Then i is incremented by 1 each time the loop iterates, and this loop continues to execute until the value of i get greater of equal to the size i.e. 5 of values array.
The output is:
2
4
6
8
10
d)
aPtr = values;
This statement assigns the first element in values array to pointer aPtr. Here values is the address of the first element of the array.
aPtr = &values[0];
In this statement &values[0] is the starting address of the array values to which is assigned to aPtr. Note that the values[0] is the first element of the array values.
e)
Since &values[0] is the starting address of the array values to which is assigned to aPtr. So this address is the physical address of the starting of the array. If referring to the part d) then use this statement to print physical address is aPtr pointing to
cout<<aPtr;
This is basically the starting address of the array values to which is assigned to aPtr.
The output:
0x7fff697e1810
f)
i variable represents offset and corresponds directly to the array index.
name of the pointer i.e. vPtr references the array
So the statement (vPtr + i) means pointer vPtr that references to array values plus the offset i array index that is to be referenced. This statement gives the address of i-th element of values array. In order to get the value of the i-th element of values array, dereference operator * is used. It returns an ith value equivalent to the address the vPtr + i is pointing to. So the output is:
2
3
6
8
10
g)
values[0] is stored at 1002500
aPtr + 3 refers to values[3],
An integer is 4 bytes long,
So the address that is referenced by aPtr + 3 is
1002500 + 3 * 4 = 1002512
values[3] is basically the element of values array at 3rd index which is the 4th element of the array so the value stored at that referred location is 8.
h)
Given that aPtr points to apples[4], so the address stored in aPtr is
1002500 + 4 * 4 = 1002516
aPtr -= 4 is equivalent to aPtr = aPtr - 4
The above statement decrements aPtr by 4 elements of apples array, so the new value is:
1002516 - 4 * 4 = 1002500
This is the address of first element of apples array i.e 2.
Now
cout<<aPtr<<endl; statement prints the address referenced by aPtr -= 4 which is 1002500
cout<<*aPtr<<endl; statement prints the value is stored at that location which is 2.
Write an interactive program to calculate the volume and surface area of a three-dimensional object.
Answer:
I am writing a Python program:
pi=3.14 #the value of pi is set to 3.14
radius = float(input("Enter the radius of sphere: ")) #prompts user to enter the radius of sphere
surface_area = 4 * pi * radius **2 #computes surface area of sphere
volume = (4.0/3.0) * (pi * radius ** 3) #computes volume of sphere
print("Surface Area of sphere is: ", surface_area) #prints the surface area
print("Volume of sphere is: {:.2f}".format(volume)) #prints the volume
Explanation:
Please see the attachment for the complete interactive code.
The first three lines of print statement in the attached image give a brief description of the program.
Next the program assigns 3.14 as the value of π (pi). Then the program prompts the user to enter the radius. Then it computes the surface area and volume of sphere using the formulas. Then it prints the resultant values of surface area and volume on output screen.
The psuedocode for this program is given below:
PROGRAM SphereVolume
pi=3.14
NUMBER radius, surface_area, volume
INPUT radius
COMPUTE volume = (4/3) * pi* radius ^3
COMPUTE surface_area = 4 * pi * radius ^ 2
OUTPUT volume , surface_area
END
industrial advantages of using a waterfall model for library system
Answer:
It allows for departmentalization and managerial control. Simple and easy to understand and use. Easy to manage due to the rigidity of the model – each phase has specific deliverables and a review process. Phases are processed and completed one at a time.
Explanation:
Tuesday
write the
correct
answer
Text can be celected using
2 A mouse
device of
is
ch
3 Scrolls bars are
buttons which assist
upwards downwards
sideways to
skole
Answer:
?
Explanation:
these are instructions to a question?
Given an integer n and an array a of length n, your task is to apply the following mutation to a:
Array a mutates into a new array b of length n.
For each i from 0 to n - 1, b[i] = a[i - 1] + a[i] + a[i + 1].
If some element in the sum a[i - 1] + a[i] + a[i + 1] does not exist, it should be set to 0. For example, b[0] should be equal to 0 + a[0] + a[1].
Example
For n = 5 and a = [4, 0, 1, -2, 3], the output should be mutateTheArray(n, a) = [4, 5, -1, 2, 1].
b[0] = 0 + a[0] + a[1] = 0 + 4 + 0 = 4
b[1] = a[0] + a[1] + a[2] = 4 + 0 + 1 = 5
b[2] = a[1] + a[2] + a[3] = 0 + 1 + (-2) = -1
b[3] = a[2] + a[3] + a[4] = 1 + (-2) + 3 = 2
b[4] = a[3] + a[4] + 0 = (-2) + 3 + 0 = 1
So, the resulting array after the mutation will be [4, 5, -1, 2, 1].
Input/Output
[execution time limit] 3 seconds (java)
[input] integer n
An integer representing the length of the given array.
Guaranteed constraints:
1 ≤ n ≤ 103.
[input] array.integer a
An array of integers that needs to be mutated.
Guaranteed constraints:
a.length = n,
-103 ≤ a[i] ≤ 103.
[output] array.integer
The resulting array after the mutation.
Answer:
The program written in Java is as follows
import java.util.Scanner;
public class mutilate {
public static void main(String [] args) {
Scanner input = new Scanner(System.in);
int n;
System.out.print("Array Length: ");
n = input.nextInt();
while(n<1 || n > 103) {
System.out.print("Array Length: ");
n = input.nextInt();
}
int a []= new int [n];
int b []= new int [n];
System.out.print("Enter Elements of the Array: ");
for(int i =0;i<n;i++) {
a[i] = input.nextInt();
}
System.out.print("Output: ");
for(int i =0;i<n;i++) {
if(i == 0) {
b[i] = 0+a[i]+a[i+1];
}
else if(i == n-1) {
b[i] = a[i - 1]+a[i]+0;
}
else {
b[i] = a[i - 1]+a[i]+a[i+1];
}
System.out.print(b[i]+" ");
}
}
}
Explanation:
This line allows the program accepts user input
Scanner input = new Scanner(System.in);
This line declares integer n
int n;
The next two line prompts user for length of the array and also accepts input
System.out.print("Array Length: ");
n = input.nextInt();
The following while iteration ensures that the user input is between 1 and 103
while(n<1 || n > 103) {
System.out.print("Array Length: ");
n = input.nextInt();
}
The next two lines declares array a and b
int a []= new int [n];
int b []= new int [n];
The next for iteration allows user enter values for array a
System.out.print("Enter Elements of the Array: ");
for(int i =0;i<n;i++) {
a[i] = input.nextInt();
}
The next for iteration calculates and prints the values for array b based on the instruction in the question
System.out.print("Output: ");
for(int i =0;i<n;i++) {
if(i == 0) {
b[i] = 0+a[i]+a[i+1];
}
else if(i == n-1) {
b[i] = a[i - 1]+a[i]+0;
}
else {
b[i] = a[i - 1]+a[i]+a[i+1];
}
System.out.print(b[i]+" ");
}
Q2) Answer the following:
1- Expression d=i++; causes:
a. The value of i incremented by 1
b- The value of i assigned to d
C- The value of i assigned to d then i incremented by 1
d- The value ol i incremented by 1 then assigned to d.
CO
SA
Answer:
D
Explanation:
The value of i is incremented by one then assigned to d
) Write the JS code to load the 3rd party script before ready event triggers and after successful load show your name on the browser with a message
Answer:
Following are the code to this question:
var id= document.createElement('script');//defining id varaible that uses the createElement method
ld.src = "https://code.jquery.com/jquery-3.5.1.min.js";//defining id varaible with src that holds the source link
alert("The loaded Script is: ");//defining alert box that print Script loaded.
Explanation:
In the above-given code, an id variable is defined that uses the createElement method, which helps to create the specified name with the Element Node, and in the next line, it uses the src with the id variable, that store the link, it also helps to loads the 3rd party script, which is displayed in an alert msg box.
Giving BRANLIEST IFFF CORRECT
Which type of chart or graph shows the contribution of each item in a total of 100%?
Bar graph
Column chart
Line graph
Pie chart
Answer:
pie chart
Explanation:
pie chart shows percentage per item
Answer:
pie chart
Explanation:
what do you mean by hardware and software?
Answer:
I think the above information will help you a lot.
Have a nice day.
Please read the screen shot brainly is not letting me write the whole thing
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not include information previously shared / agreed upon by the sender and receiver.)
Answer:
The answer is "secret key k".
Explanation:
When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.
when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.
During transit, the message was certainly not changed. Anybody with the private key – preferably even a preferred sender sent out this letter.The fact that the speed of a vehicle is lower than the prescribed limits shall relieve the driver from the duty to decrease speed when approaching and crossing an intersection. True or false
Explanation:
the answer is false ........
The fact that the speed of a vehicle is lower than the prescribed limits shall relieve the driver from the duty to decrease speed when approaching and crossing an intersection is not true.
What is intersection in the traffic rules?An intersection serves as the point where many lanes cross on the road which is a point where driver is required to follow the traffic rules.
However, the above statement is not true because , a driver can decide not decrease speed when approaching and crossing an intersection, even though it is a punishable offense in traffic rules.
Read more on traffic rules here: https://brainly.com/question/1071840
#SPJ2
what is computer with figure
Answer:
A computer is an electronic device that accept raw data and instructions and process it to give meaningful results.
convert decimal number into binary numbers (265)10
Answer:
HELLOOOO
Alr lets start with steps by dividing by 2 again and againn..
265 / 2 = 132 ( rem = 1 )
132 / 2 = 66 ( rem = 0 )
66/2 = 33 ( rem = 0 )
33/2 = 16 ( rem = 1 )
16/2 = 8 ( rem = 0 )
8/2 = 4 ( rem = 0 )
4/2 = 2 ( rem = 0 )
2/2 = 1 ( rem = 0 )
1/2 = 0 ( rem = 1 )
now write all the remainders from bottom to up
100001001
is ur ans :)))
The web development team is having difficulty connecting by ssh to your local web server, and you notice the proper rule is missing from the firewall. What port number would you open on your webserver?
a. Port 21
b. Port 22
c .Port 25
d. Port 80
e. Port 443
Answer:
Option b (Port 22) seems to the appropriate choice.
Explanation:
Below seem to be some measure you should take to correct this mistake.
Verify whether Droplet's host IP address seems to be right. Verify existing connection supports communication over all the utilized SSH port. Any access points can be able to block port 22 and sometimes customized SSH. For illustration, you could do this by checking different hosts who used the same port, using only a recognized working SSH connection. These could help you identify unless the current problem is not particular to clients' Droplet. Authenticate the Droplet configuration settings. Verify that they're not being configured to DROP 's preferred policy, and do not apply the port to require connectivity.The SSH server also operates on port 22, by default.
Other choices don't apply to the specified scenario. So that the argument presented above will be appropriate.
The port number would you open on your webserver is Port 22
For better understanding let's explain SSH means.
Service Name and Transport Protocol Port Number Registry. where the service name is Secure Shell (SSH) Protocol and it has the port number of 22 therefore this mean that SSH will only work with port 22 using it for other port will only result in difficulty in connection. SSH has other names like Secure Shell or Secure Socket Shell. it is known as a network protocol that helps its users with system administrator.From the above we can therefore say that the answer The port number would you open on your webserver is Port 22, is correct
Learn more about SSH and port from:
https://brainly.com/question/13054022
A member of the human resources department received the following email message after sending an email containing benefit and tax information to a candidate: Your message has been quarantined for the following policy violation external potential PII.Pls contact the IT security admin for further details. Which of the following BEST describes why this message was received?a. The DLP system flagged the message. b. The mail gateway prevented the message from being sent to personal email addresses c. The company firewall blocked the recipient's IP address. d. The file integrity check failed for the attached files.
Answer:
a. The DLP system flagged the message.
Explanation:
Data Leaked Prevention System is the software that detects potential data breaches that may result in the future. It detects the possible data breach, then monitors it and immediately blocks any sensitive data. DLP system is widely used by businesses. The human resource team received a message because sensitive information about the business benefits and tax is shared with a candidate.
A TCP entity opens a connection and uses slow start. Approximately how many round-trip times are required before TCP can send N segments
Answer:
Round trip times required = log2N
Explanation:
The round-trip times required before TCP can send N segments using a slow start is log2N. we can arrive at this by looking at the mode of operation of TCP which is at the 1st time of using a TCP it starts the congestion window as 1 then it sends an initial segment. When the acknowledgement of the initial segment arrives, TCP increases the congestion window to 2 and then sends 2 segments, When the 2 acknowledgements of the segments sent out arrives, they each increase the congestion window by one, thereby increasing the congestion window to 4 . therefore it takes log2N round trips before TCP can send N segments
If Scheme were a pure functional language, could it include DISPLAY ? Why or why not?
Answer:
When Scheme is a pure functional language, it cannot include the function DISPLAY. Since the pure functional languages will return the same value whenever the same expression is evaluated, and the DISPLAY would be the output and thus it cannot be part of the purely functional language. Thus in the pure functional language we can evaluate the expressions with the same arguments and it returns the same value since there is no state to change.
Explanation:
I have an PC and it has one HMDI port but I need two monitors other problem is I need one monitor to connect to my USB drive work system and one to stay on my regular windows system how can I do this?
Answer:
You'll need dual monitor cables and an adapter.
Explanation:
First Step
Position your monitors on your desk or workspace. Make sure the systems are off.
Second Step
Make sure your power strip is close by. Then plug your power strip and connect the first monitor to your PC via your HDMI
Use an adapter to do the same for the second monitor.
Turn the entire system on
Third Step
On your PC, right click on a blank place in your home screen and click on Display Settings.
If you want to have two separate displays showing the same thing, select Duplicate, but if you want to have the two displays independent of each other, select Extend Display.
Apply the settings and select Done.
What are the basic characteristics of object-oriented analysis and design (OOAD)? How does OOAD compare to structured analysis and design (SAD)?
Answer:
Basic characteristics of OOAD and compression with SAD can be defined as follows:
Explanation:
The Object-oriented analysis is described as a design and analysis system like an application, that uses Oops programming. It is the measurement model, that is the presentation, which became a part of the object-based review.
The features of OOAD can be defined as follows.
The complex issues are simply solved. The operation of very fast recovery. The stability in condition changes. Its conceptual method for resolving its extremely complex problems.The difference in OOAD and SAD can be defined as follows:
The OOAD mainly focuses upon the design of objects, it can be used in highly complex logical systems, whereas the SAD focuses on data analysis systems and processes. The OOAD uses the framework to target data, but the SAD is process-oriented. It uses class and UML diagrams, but SSAD uses DFDs to extract the element, it has many limited steps to prepare and execute, but OOAD relies mostly on initial growth. This method is being developed in the course of the process.If the processor has 32 address lines in its address bus; i.e. 32-bit address range, what is its address space or range; i.e. what is the smallest and largest address that can be represented
Answer:
The answer is "0 to 4294967295"
Explanation:
Given bit:
32 bits
Calculating smallest and largest bits:
In any processor, it works only on the 0 and 1 bit and it also stores 0 and 1 values. so, the smallest address in bit value is= 0 and the largest bit value can be defined as follows:
largest address value in bits:
[tex]\Longrightarrow 2^{32}-1\\\\\Longrightarrow 4294967296 -1\\\\\Longrightarrow 4294967295\\\\[/tex]
smallest address= 0
largest address = 4294967295
In using cloud infrastructures, the client necessarily cedes control to the CP on a number of issues that may affect security
a. True
b. False
Answer:
A. True
Explanation:
The correct option is A. True.
Actually, in using cloud infrastructures, the client necessarily cedes control to the CP on a number of issues which may affect security. It may have to restrict port scans and even penetration testing. Moreover, the service level agreements may not actually guarantee commitment to offer such services on the part of the CP. This may result in leaving a gap in security defenses.
Also, when the control of the CP changes, it's evident that the terms and conditions of their services may also change which may affect security.
5 Major of computer application
Answer:
Basic Applications of Computer
1 ) Home. Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc.
2 ) Medical Field.
3 ) Entertainment.
4 ) Industry.
5 ) Education.
Explanation:
Hope it helps you
Mark my answer as brainlist
have a good day
Điều gì sẽ xảy ra nếu bỏ một ly nước nóng vào tủ đông đá?
Answer:
A glass of hot water will freeze, of course, but at a faster rate than a glass of normal temperature water
You are in the process of building a computer for a user in your organization. You have installed the following components into the computer in Support:AMD Phenom II X4 quad core processor8 GB DDR3 memoryOne SATA hard drive with Windows 7 installedYou need to make sure the new components are installed correctly and functioning properly. You also need to install a new SATA CD/DVD drive and make sure the computer boots successfully.Perform tasks in the following order:Identify and connect any components that are not properly connected.Use the PC tools on the shelf to test for components that are not functioning. Replace any bad components with the known good parts on the shelf.Install the required CD/DVD drive in one of the drive bays and connect the power cable from the power supply.
Answer:
i would check all connections from the hard drive and power supply and check your motherboard for any missing sauters and or loose no contact connections
Explanation:
advantages of computational skill
Explanation:
algorithmic thinking - developing a set of instructions or sequence of steps to solve a problem;
evaluation - ensuring a solution is fit-for-purpose;
decomposition - breaking a problem down into its component parts;
In the Gradient Descent algorithm, we are more likely to reach the global minimum, if the learning rate is selected to be a large value.
a. True
b. False
Answer:
false i think.
Explanation:
Gradient Descent is more likely to reach a local minima. because starting at different points and just in general having a different starting point, will lead us to a different local minimum( aka the lowest point closest to the starting point). if alpha(the learning rate) is too large, gradient descent may fail to converge and may even diverge.