558c::d367:7c8e:1216:0:66be
Define a function group-by-nondecreasing, which takes in a stream of numbers and outputs a stream of lists, which overall has the same numbers in the same order, but grouped into segments that are non-decreasing.
Answer:
def group_by_nondecreasing( *args ) :
num_list = [arg for arg in args]
sorted_numlist = sorted( num_list )
list_stream = [ sorted_numlist, sorted_numlist, sorted_numlist ]
return list_stream
Explanation:
This python function has the ability to accept multiple and varying amount of arguments. the list comprehension shorten the logical for statement to generate a list of numbers, sorts the list in ascending order by default and duplicates the list in another list.
Explain how mobile phone production could be more sustainable
Answer:
Sustainable design - the key features for sustainable phones are: use of sustainable and recycled materials, the use of less energy and efficient charging, durability, and last but not least they should be easy and inexpensive to repair.
Answer:
One of the best ways to change this is to voice your concern to cell phone manufacturers for more sustainable products. Request smartphones that are made with fewer hazardous chemicals, manufactured in plants powered by renewable energy, and that contain recycled materials.
Explanation:
Hello, I am having trouble adding a txt file into a array, so I can pop it off for a postfix problem I have uploaded what I have so far. I need help please
Answer:
#include <stack>
#include<iostream>
#include<fstream> // to read imformation from files
#include<string>
using namespace std;
int main() {
stack<string> data;
ifstream inFile("postfix.txt");
string content;
if (!inFile) {
cout << "Unable to open file" << endl;
exit(1); // terminate with error
}
while (getline(inFile, content)) {
data.push(content);
}
inFile.close();
return 0;
}
Explanation:
You were very close. Use the standard <stack> STL library, and make sure the stack elements are of the same type as what you're trying to add, i.e., std::string.
how do you run a function in python?
Suppose that a class named ClassA contains a private nonstatic integer named b, a public nonstatic integer named c, and a public static integer named d. Which of the following are legal statements in a class named ClassB that has instantiated an object as ClassA obA =new ClassA();?
a. obA.b 12;
b. obA.c 5;
c. obA.d 23;
d. ClassA.b=23;
e. ClassA.c= 33;
f. ClassA.d= 99;
Answer:
b. obA.c 5;
d. ClassA.b=23;
f. ClassA.d = 99;
Explanation:
Java is a programming language for object oriented programs. It is high level programming language developed by Sun Microsystems. Java is used to create applications that can run on single computer. Static variable act as global variable in Java and can be shared among all objects. The non static variable is specific to instance object in which it is created.
Which of the following BEST describes an inside attacker?
An agent who uses their technical knowledge to bypass security.
An attacker with lots of resources and money at their disposal.
A good guy who tries to help a company see their vulnerabilities.
An unintentional threat actor. This is the most common threat.
The inside attacker should be a non-intentional threat actor that represents the most common threat.
The following information related to the inside attacker is:
It is introduced by the internal user that have authorization for using the system i.e. attacked.It could be intentional or an accidental.So it can be non-intentional threat.Therefore we can conclude that The inside attacker should be a non-intentional threat actor that represents the most common threat.
Learn more about the threat here: brainly.com/question/3275422
what makes''emerging technologies'' happen and what impact will they have on individuals,society,and environment
Answer:
Are characterized by radical novelty
Explanation:
Example, intelligent enterprises are reimaging and reinventing the way they do bussines
A __________ infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.
a. community cloud
b. hybrid cloud
c. public cloud
d. private cloud
[tex]\Huge{\fbox{\red{Answer:}}}[/tex]
A public cloud infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.
[tex]<font color=orange>[/tex]
a. community cloud
b. hybrid cloud
c. public cloud ✔
d. private cloud
If you are to enhance the ICT used by your teachers, how will ypu do it? Will you use the same ICT or will you modify how it was integrated?
To enhance the ICT (Information Communication Technology) used by teachers, I will modify how the ICT was integrated.
The modification of how ICT is integrated will change the culture that places teaching over technology. Then, teachers will be taught how to use ICT to:
improve learning so that teachers become learning facilitatorsmotivate learners by fostering learning autonomy, making students less dependent on the teacherengage the learners by creating collaborative learningdiminish content learning so that students learn to think, create, and communicate effectivelymake learning a lifetime culture enhance the learning environment so that teachers become collaborators and co-learners with students.Thus, I will enhance the ICT used by teachers by modifying its integration to achieve better results for both teachers and learners.
Learn more about the importance of ICT here: https://brainly.com/question/13724249
list 2 forms of computer output
Answer:
Soft copy like audio
Hard copy e.g printouts
Explanation:
Maintaining public libraries is a waste of money since computer technology can replace their functions. Do you agree or disagree?
Answer:
I totally do not agree that maintaining public library is a waste of moneyExplanation:
Most library are now advancing in terms of service delivery and public
libraries are no exception as libraries are now incorporating E- platforms/E- libraries, Audio visuals, where anyone can learn or borrow materials electronically.
Furthermore, not everyone can own a computer set to so that public libraries are even relevant to the majorities who can afford a computer set.
Also a library especially the public library is a place where people can meet and socialize to the end we even make friends at the public library more effectively than the online library can make(if they can).
In summary the pros of physical public libraries can not be over emphasized.
1)What is Big Data?
2) What is machine learning?
3) Give one advantage of Big data analytics.
4) Give any one application of Big Data Analytics. 5) What are the features of Big Data Analytics?
Answer:
Big data is defined as the extremely large data set that may be analysed computationally to reveal pattern,trends and associations, related to human behaviour and interaction.
Machine learning is a sub area of artifical intelligence where by the terms refers to the ability of IT system to independently find the solution to problem by reconnaissance pattern in databases.
The one advantage of bigdata is
To ensure hire the right employees.
The application of bigdata data is
to communicate media application nd entertainment
An employer plans to pay bonus to each of his employees. Those earning Rs. 2000 or above are to be paid 10 percent of their salary and those earning less than 2000 are to be paid Rs. 200. The input record contains employee number, name and salary of an employee. The output should be employee name and their bonus. Write pseudo code algorithm to process the requirement.
Answer:
vfg
Explanation:
11. Which of the following is word processing
software?
Hope this is correct
HAVE A GOOD DAY!
Assume the existence of a Phone class. Define a derived class, CameraPhone that contains two data members: an integer named, imageSize, representing the size in megabytes of each picture, and an integer named memorySize, representing the number of megabytes in the camera's memory. There is a constructor that accepts two integer parameters corresponding to the above two data members and which are used to initialize the respective data members. There is also a function named numPictures that returns (as an integer) the number of pictures the camera's memory can hold.
#include <iostream>
using namespace std;
class CameraPhone:Phone{
int imageSize,memorySize;
public:
CameraPhone(int image_size,int memory_size):imageSize(image_size),memorySize(memory_size){}
int numPictures(){
return memorySize-imageSize;
}
}
int main(){}
Here is the code for the derived class, CameraPhone:
class Phone:
def __init__(self, brand, model, price): self.brand = brand self.model = model self.price = priceclass CameraPhone(Phone):
def __init__(self, brand, model, price, imageSize, memorySize): super().__init__(brand, model, price) self.imageSize = imageSize self.memorySize = memorySizedef numPictures(self):
return self.memorySize // self.imageSizeWhat are the derived class?This code defines a derived class, CameraPhone, that inherits from the Phone class. The CameraPhone class has two additional data members: imageSize and memorySize. The constructor for the CameraPhone class takes two additional parameters corresponding to these data members. The numPictures() function returns the number of pictures that the camera's memory can hold.
Here is an example of how to use the CameraPhone class:
phone = CameraPhone("Apple", "iPhone 13 Pro", 1000, 10, 100)
print(phone.numPictures())
# Output: 10
This code will print the number of pictures that the camera's memory can hold, which is 10 in this case.
Find out more on derived class here: https://brainly.com/question/31942927
#SPJ2
Solve using Matlab the problems:
One using the permutation of n objects formula
One using the permutation of r objects out of n objects
you can make up your own questions.
Help me please
Answer:
Explanation:
% Clears variables and screen
clear; clc
% Asks user for input
n = input('Total number of objects: ');
r = input('Size of subgroup: ');
% Computes and displays permutation according to basic formulas
p = 1;
for i = n - r + 1 : n
p = p*i;
end
str1 = [num2str(p) ' permutations'];
disp(str1)
% Computes and displays combinations according to basic formulas
str2 = [num2str(p/factorial(r)) ' combinations'];
disp(str2)
=================================================================================
Example:
How many permutations and combinations can be made of the 15 alphabets, taking four at a time?
The answer is:
32760 permutations
1365 combinations
Complete the function to replace any period by an exclamation point. Ex: "Hello. I'm Miley. Nice to meet you." becomes:
"Hello! I'm Miley! Nice to meet you!"
#include
#include
using namespace std;
void MakeSentenceExcited(char* sentenceText) {
/* Your solution goes here */
}
int main() {
const int TEST_STR_SIZE = 50;
char testStr[TEST_STR_SIZE];
strcpy(testStr, "Hello. I'm Miley. Nice to meet you.");
MakeSentenceExcited(testStr);
cout << testStr << endl;
return 0;
}
Answer:
Here is the complete function:
void MakeSentenceExcited(char* sentenceText) { // function that takes the text as parameter and replaces any period by an exclamation point in that text
int size = strlen(sentenceText); //returns the length of sentenceText string and assigns it to size variable
char * ptr; // character type pointer ptr
ptr = sentenceText; // ptr points to the sentenceText string
for (int i=0; i<size; i++){ //iterates through the sentenceText string using i as an index
if (sentenceText[i]=='.'){ // if the character at i-th index of sentenceText is a period
sentenceText[i]='!'; } } } //places exclamation mark when it finds a period at i-th index of sentenceText
Explanation:
The program works as follows:
Suppose we have the string:
sentenceText = "Hello. I'm Miley. Nice to meet you."
The MakeSentenceExcited method takes this sentenceText as parameter
int size = strlen(sentenceText) this returns the length of sentenceText
The size of sentenceText is 35 as this string contains 35 characters
size = 35
Then a pointer ptr is declared which is set to point to sentenceText
for (int i=0; i<size; i++) loop works as follows:
1st iteration:
i=0
i<size is true because i=0 and size = 35 so 0<35
So the body of loop executes:
if (sentenceText[i]=='.') statement checks :
if (sentenceText[0]=='.')
The first element of sentenceText is H
H is not a period sign so the statement inside if statement does not execute and value of i increments to 1. Now i = 1
2nd iteration:
i=1
i<size is true because i=1 and size = 35 so 1<35
So the body of loop executes:
if (sentenceText[i]=='.') statement checks :
if (sentenceText[1]=='.')
This is the second element of sentenceText i.e. e
e is not a period sign so the statement inside if statement does not execute and value of i increments to 1. Now i = 2
So at each iteration the if condition checks if the character at i-th index of string sentenceText is a period.
Now lets see a case where the element at i-th index is a period:
6th iteration:
i=5
i<size is true because i=5 and size = 35 so 5<35
So the body of loop executes:
if (sentenceText[i]=='.') statement checks :
if (sentenceText[5]=='.')
This is the character at 5th index of sentenceText i.e. "."
So the if condition evaluates to true and the statement inside if part executes:
sentenceText[i]='!'; statement becomes:
sentenceText[5]='!'; this means that the character at 5th position of sentenceText string is assigned an exclamation mark.
So from above 6 iterations the result is:
Hello!
This loop continues to execute until all the characters of sentenceText are checked and when the value of i gets greater than or equal to the length of sentenceText then the loop breaks.
The screenshot of the program along with its output is attached.
Your system is infected with a virus that can modify signature each time it is executed to fool antivirus software. Which type of virus is this?
Answer:Polymorphic Virus
Explanation:
Malware that can change its signature each time is polymorphic
Pls help me Pls help me
Answer:
20 10
Explanation:
please mark me as brainlyest
consider l= 5 ,r= 11. you must determine the sum of the values of the function in the range L to R . you have to calculate sum = lrf(x) in python coding
def summation (num1, num2):
i = 0
for x in range (num1 : num2 + 1):
i += x
return i
print ( summation(l, r))
who is the owner of apple company??
Answer:
Steven Paul Jobs......
....
some properties of Internal and External Storage.
Answer:
Internal Storage
This has to do with the primary memory of a computer that is used to store the user's files, applications, etc. This is where the Operating System and pre-installed software is installed. There are two types of internal memory which are ROM and RAM.
Properties
They are volatileThey contain the OS of the systemROM loses data when power is lostRAM does not lose storage when power is lost.External Storage
These are secondary memory that is not primarily permanently attached to the computer. This is a device that contains all the addressable data storage which are not inside the computer's storage. Some examples of external storage are flash drives, CD ROMs, etc.
Properties
They are addressableThey can be easily detached.write the full form of E-mail?
Answer:
Electronic Mail. This is your answer.
You are the network administrator for your company. A user reports that he cannot access network resources from his computer. He was able to access the resources yesterday. While troubleshooting his computer, you find that his computer is issued an Automatic Private IP Addressing (APIPA) address. All the network equipment in the user's computer is functioning properly because you are able to access the user's computer from a remote computer. What is most likely the problem
Answer:
the issued Automatic Private IP Addressing (APIPA) address.
Explanation:
Since we are told that the user was able to access the network resources yesterday, and all the network equipment in the user's computer is functioning properly, there is a very high possibility that because the user's computer has been issued an Automatic Private IP Addressing (APIPA) address, it affected his computer's ability to connect to a public network.
This is the case because private network IP addresses are known to prevent inflow and outflow of data onto public networks.
explain computer coding in an understandable manner
Answer:
Coding is simply how we communicate with computers. Code tells a computer what actions to take, and writing code is like creating a set of instructions
Explanation:
Computer coding empowers kids to not only consume digital media and technology, but to create it. Instead of simply playing videogame or envision what their own website, or app might look like and they'll have the outlet for the expression
Select all steps in the list below that should be completed when using the problem-solving process discussed in this chapter.
Take action.
Take a break.
Evaluate.
Complete the task.
Consider solutions and list ideas.
Understand the task or need.
Ask a coworker for help.
Take action.
Evaluate.
Complete the task.
Consider solutions and list ideas.
Understand the task or need.
Describe how tuples can be useful with loops over lists and dictionaries,
and give Python code examples.
Create your own code examples. Do not copy them from the textbook or any other source.
Your descriptions and examples should include the following: the zip function, the enumerate function, and the items method.
Answer:
what is computer
what is simple machine
what is output device
What are some of the major issues with geotagging? What concerns you the most?
Answer:
Major issues with geotagging include the ability to pinpoint the exact location where a photo was taken, which raises privacy concerns.
What concerns me the most is when a geotag of an unsuspecting victim's location falls into the wrong hands.
Explanation:
Geotag - A geographical tag that can attach to SMS text messages, media such as photos and images, etc. The Geotag is measured in the longitude and latitude at which the image or text message took place.
Which is the first computer brought in nepal for the census of 2028 B.S
Answer:
The first computer brought in Nepal was IBM 1401 which was brought by the Nepal government in lease (1 lakh 25 thousands per month) for the population census of 1972 AD (2028 BS). It took 1 year 7 months and 15 days to complete census of 1crore 12.5 lakhs population.
Alice and Bob are unknown to each other. Alice wants to send an encrypted message to Bob. So it chooses a KDC which is known to both Alice and Bob (protocol in page 338). Alice and KDC have A5 (hexa) as a shared key. Bob and KDC have 4B (hexa) as a shared key. Alice sends a request to KDC to generate a session key so it can communicate with Bob. KDC generates 56(hexa) as a session key. Alice intends to send 13 (hexa) as a message to Bob. For simplicity assume that the encryption and decryption operations are simply XOR operation of the key with the message. Answer the following.
1. What information does KDC send to Alice? Show as hex characters.
2. What information does Alice send to Bob? Show as hexa characters.
3. What message does Bob retrieve after decryption? Show as hexa characters.
3. ¿Qué mensaje recupera Bob después del descifrado? Mostrar como caracteres hexadecimales.
Respuesta: la clave con el mensaje :